Action not permitted
Modal body text goes here.
cve-2017-5753
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Most Modern Operating Systems |
Version: All |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.670Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Most Modern Operating Systems", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "All" } ] } ], "datePublic": "2018-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-19T17:48:07", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "tags": [ "x_refsource_MISC" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX231399" }, { "tags": [ "x_refsource_MISC" ], "url": "https://spectreattack.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "url": "https://spectreattack.com/" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-1/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5753", "datePublished": "2018-01-04T13:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T22:24:53.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-5753\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2018-01-04T13:29:00.257\",\"lastModified\":\"2024-11-21T03:28:19.097\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.\"},{\"lang\":\"es\",\"value\":\"Los sistemas con microprocesadores con ejecuci\u00f3n especulativa y predicci\u00f3n de ramas podr\u00edan permitir la revelaci\u00f3n no autorizada de informaci\u00f3n al atacante con acceso de usuario local mediante un an\u00e1lisis de un canal lateral.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:N/A:N\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-203\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD028C10-FD07-4206-A732-CCAC1B6D043D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704FAA50-1B7D-4917-AC4A-4C58785340F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C6B95D3-75BD-4826-BFBE-9701CC0FF052\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F66E31A6-EA01-40C8-8718-CE2C1F45EEB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBBE3B05-2063-49DE-A1D3-9D0A62E0CF5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"022F2CBE-EFB1-4962-AC91-D25AAB057DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C05CD9-551B-46EE-85F8-D18FF878FE8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DCCB5A5-20E3-4EC5-956C-EA7C0F33A026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C38C609-242E-4923-A81F-DAFBE7B6A927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AEB08B5-7CBA-479A-A41B-FD8A6D9E0875\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C4FDD7-F2EC-4EDB-ACC9-3D6B9152C855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E51DD0B-1EED-4BE9-B0A7-BE2E91CCA84C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7AC7C56-2205-4121-99E2-001A7488E0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1677313-FF8F-493B-9DA3-C78F87581A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2A3CCE-FA57-43B5-B7DE-CFD0CC2ECD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85CA4444-5103-4451-8A7C-F6BBE714BBB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA1EB745-46D7-4088-93C6-E7156520B144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A93010C0-33B3-438F-94F6-8DA7A9D7B451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A988A78-6B3D-4599-A85C-42B4A294D86D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246AA1B0-B6C8-406B-817D-26113DC63858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00EE5B42-FF05-447C-BACC-0E650E773E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F0E3C4-7E9B-435F-907E-4BF4F12AF314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D616C72-0863-478C-9E87-3963C83B87E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC333B0D-3A0E-4629-8016-68C060343874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6655535C-FF64-4F9E-8168-253AABCC4F5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD68F3F-7E38-40B9-A20B-B9BB45E8D042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EACEF19-83BC-4579-9274-BE367F914432\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24128A7F-2B0B-4923-BA9E-9F5093D29423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0990DD71-9E83-499D-9DAF-A466CF896CFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B7FEDEF-9772-4FB1-9261-020487A795AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B0F72-DEDF-40C4-887C-83725C52C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9568C222-9816-4520-B01C-C1DC2A79002D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53A1F23D-7226-4479-B51F-36376CC80B04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAB245C8-9918-41A0-9DFB-A11E4185C87A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9990DD08-BD81-4BFA-B3D4-0DECBF8CCC54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F752A3C8-18ED-4765-B6EC-C664154EB701\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F31C3F-7C0D-4D95-B4B9-89FD38076913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BEEE36E-E735-4A33-80B7-9407D072F6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CB3D3DE-21BE-40C7-A510-AC97C92390DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9A9545-38A3-460D-AB1A-8B03BEB405A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1860D932-777D-41F2-94A2-D14AB1494AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75165A10-2FD5-4370-814C-B60FDE339AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454AC633-5F1C-47BB-8FA7-91A5C29A1DD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2394E8C-58D9-480B-87A7-A41CD7697FC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9AC02B-D3AE-4FAF-836E-55515186A462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65AAC7A7-77CA-4C6C-BD96-92A253512F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD16C07-0050-495A-8722-7AC46F5920F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01423706-C82C-4457-9638-1A2380DE3826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A881E2D3-A668-465F-862B-F8C145BD5E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6602DD69-E59A-417D-B19F-CA16B01E652C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED96AC16-12CC-43F6-ACC8-009A06CDD8F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE9DC29-C192-4553-AF29-D39290976F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F625E647-B47E-404C-9C5B-72F3EB1C46F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5878612-9825-4737-85A5-8227BA97CBA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F453D348-28CE-402B-9D40-A29436A24ECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36322F4B-83D7-468A-BB34-1C03729E9BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2A50E-94FA-44E9-A45D-3016750CFBDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5625CAD8-4A62-4747-B6D9-90E56F09B731\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78DE1A01-3AEF-41E6-97EE-CB93429C4A1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"410184AF-B932-4AC9-984F-73FD58BB4CF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B265F073-9E0A-4CA0-8296-AB52DEB1C323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F664223-1CBC-4D8A-921B-F03AACA6672B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"987A8470-08BA-45DE-8EC0-CD2B4451EECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBC9542-FB77-4769-BF67-D42829703920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FDC18B-4662-422E-A86A-48FE821C056F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E4461B-72F8-4F3D-A405-4AFA99EC8A32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663DDC1C-E48A-4E84-A6CC-B46FC45D6A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CEEC75B-10CE-4B7E-BA5F-6D661EC07FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAEDED56-9387-4DAC-BF52-C32ECCB7D407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA13F31C-BBD9-48C7-8499-92D0B5CA8CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E57A9B28-734B-401D-B24C-A295F364D8E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F02289DF-4A02-4602-89B7-E9148236EE1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"723E7155-493D-4B5A-99E2-AB261838190E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E37264-E4BA-4D9D-92E7-56DE6B5F918F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8704BE6D-2857-4328-9298-E0273376F2CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"731F1E65-1D53-443B-8E2F-8AF11191AFA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02A83822-822D-4A4D-B29B-A5BE6367A7DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C32738-F08E-469C-8DE0-2708F30574A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B292187E-8EAD-49D2-B469-B14CA0656035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7D131E1-24C1-48CF-B3DD-46B09A718FB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABF1231-73CF-4D1B-860C-E76CD26A645E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F88E38-4EC4-41DB-A59D-800997440C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32FD6647-4101-4B36-9A9A-F70C29997148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D248D668-A895-43B3-ADEF-1B22EE7DC76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"858411B5-E904-45FA-8B33-5CC73B915B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BB9336C-C893-4AB0-9402-868CE9960058\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4695F94-7AAE-4219-9EF6-CE6D0838192D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD7A0991-73F0-410D-855C-BFC88A66E61F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAF5CF9A-B3F2-4686-B933-7DB13AD2CF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9858EAC3-C1CE-449B-A605-FFA337DA825D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7A8F905-A4C6-4EC6-B9E8-800948350B89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565B48E3-1406-4E3C-B4A5-35865C5614E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46B6C4D7-B0A2-4DF1-B8DE-19C806D5FABB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB82A90-C0BC-4BA8-88CA-4967BC3A4A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"191A094B-E354-4767-AD43-87CE140BF851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1289B9E-5725-42EF-8848-F545421A29E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238A21CB-F8C5-468B-B523-6D014E2EA8AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC52CDD-614D-4EA0-8DA8-D71189C42E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4229DB2-8BBC-49F8-87A8-2E7D56EFD310\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBA7322-4D95-4E70-B6A5-E0D8F1B5D7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E91F46-D950-4894-BACF-05A70C7C6F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E12B40B-5221-48A6-B2A6-D44CD5636BB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BCB77C9-ABE3-44A0-B377-7D7035E8A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D06639F5-5EE8-44F4-B48A-5694383154DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD9662C9-59D3-4B3E-A4DA-4F1EE16FC94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"637C3687-FBCC-41A0-BFE6-823BAE45FB92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2350A197-193F-4B22-80E8-3275C97C78EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"734C7A7E-ACCA-4B34-BF38-0FAED988CC6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D9ABAFC-B3B5-449D-A48E-2E978563EDE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99019EA0-6576-4CE7-B60A-975D418AA917\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E846AEF-751D-40AD-84B5-EFDC9CF23E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9DD909-B2AC-46BA-B057-D239D0773CAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54F5C355-FDFC-4E71-93AA-218389EF10E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A1CA1E-971D-4F67-864E-2E772C1E736B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5F8391-D974-49AC-8550-ADB3FA6C0535\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8302BF58-9E54-40DA-BCFE-59CA52C460D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECCDE9EF-037B-4650-8131-4D57BE141277\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BA9DA8-F690-4E3C-AEF6-6A5C7BAA6F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8253DA-9A04-40D6-84C1-C682B4023D4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAF6D175-85C3-4C72-AD9F-31B47EF43154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A5FC594-2092-4240-9538-235BBE236DD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87D95F00-EA89-4FDE-991C-56636B8E0331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32C40D38-F7F2-4A48-ADAA-6A8BBD6A1A00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4158561F-8270-42D1-91D8-E063CE7F5505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF0DEA96-0202-41EB-BDC3-24E2FC4415B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BACE1C-5D66-4FBC-8F86-30215A623A94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF707146-0D64-4F3A-AE22-956EA1CB32B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8118C3F9-0853-4E87-9E65-86E1398B2780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A298501-C4D7-48D4-90F9-15AFA59DED48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEE1B07B-3D92-4D2D-8667-D902F002277F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F05CB19-1059-4C4D-BFD7-9F51A22A4F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5588732F-7F1A-4C24-B35F-30532107FFDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A127DD5D-426D-4F24-A8C5-DC9DAC94B91C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EE0BBD-3982-4B0F-82F6-D58E077C75DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAEEC918-EA25-4B38-B5C3-85899D3EBE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"813965F4-3BDA-4478-8E6A-0FD52723B764\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C5EA2F4-F3EF-4305-B1A1-92F636ED688F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04384319-EE8C-45B4-8BDD-414502E7C02D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52528CE-4F31-4E5F-8255-E576B20F3043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6C3F422-F865-4160-AA24-1DAFAE63729C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D034E7F-4D17-49D7-BDB2-90CB4C709B30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C18E6B4-E947-403B-80FB-7095420D482B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2814CC9F-E027-4C5A-93AF-84EA445E6C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A470C3-AAAA-4A6E-B738-FEB69DB78B9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1236944-4942-40E4-9BA1-029FEAE94BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086CAB4B-A10A-4165-BC33-33CADCD23C0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1A6A1EB-B3AB-4CB4-827E-CCAAD783F8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAFB6B30-BFB0-4397-9E16-37D1A772E639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCB9D7B-7D0A-435D-8499-C16BE09E19FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64277594-9713-436B-8056-542CFA9F4CFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"589BB170-7CBA-4F28-99E3-9242B62E2918\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B9C4D9-DA09-4377-9DCD-225857BD9FA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03D0265F-840B-45A1-90BD-9ED8846A9F63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BAC0EC-2B38-4553-A399-4BD5483C4753\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4477EBA6-F0A7-452B-96E8-BA788370CCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1285D817-B5B8-4940-925D-FCDD24810AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D289F7B4-27CD-4433-BB45-06AF98A59B7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00168903-6012-4414-87D1-2EE52AA6D78E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AE8D524-577E-4994-8A4B-D15022C84D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75977B0B-C44D-43BC-8D7A-AF966CDB1901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE7F5D52-9F41-49A4-B941-E0D777203FF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52B5B3FD-5BEA-4DE8-B010-55FED1547167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"167B1B04-5823-4038-A019-3975A3B447C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6C7A4EA-0B5E-47CD-8924-3B1B60EB4BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BA096E0-5480-47CB-822B-D11D7E20F69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30357469-0B8F-4385-A282-2F50181EA442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE70772-7796-4594-880A-6AAD046E4D8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A9E2F8D-2974-4833-9EC2-233CEE257C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EE3078-454F-48F8-B201-3847DB40D5C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE32C500-55C2-41A7-8621-14EBF793BF11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D3DF52-501A-4656-98F1-8DD51D04F31F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EA603AD-6CF1-44B2-876D-6F1C0B7EF2C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09578301-CF39-4C24-951A-535743E277EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F4D14AA-7DBF-4B73-BDEF-6248EF5C0F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A65F303-96C8-4884-8D6F-F439B86BA30C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E046105-9DF5-425F-A97E-16081D54613C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2987BCF-39E6-49B6-8DEE-963A38F12B07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AEDE2B7-9AA2-4A14-8A02-9A2BFF0DDCBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AD92AD8-033A-4AAD-91E5-CB446CCE9732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77E0E73A-F1B4-4E70-B9F1-EE97785B8891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61D6E3CC-79B1-4995-9A76-41683C7F254A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CEB2B1-BD1A-4B89-8E03-4F90F04A0F0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FE5773D-3CD1-4E63-8983-E0105C46D185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A7C307A-6576-4A0A-8F4E-0981C9EE2901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B3A53B-902C-46A5-8CE7-B55102703278\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB843479-729A-4E58-8027-0FC586F051AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF5A233-1E77-49FD-AC2C-60D185481E28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18519CF2-B0DA-42DD-8A3E-9084298C210A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"329D5FCF-7EC5-4471-906B-3619A180BD52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD43EAA-F3A5-4748-9187-A6E6707ACD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6F3C14D-4BFC-4205-8781-95E6B28C83C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20942AD8-ADB7-4A50-BDBE-DB36249F4F52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EC6ED02-134B-4322-AB72-75A0AB22701E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA74EEE-54CC-4F80-B1D3-99F7771335ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B859F7-0373-4ADD-92B3-0FAB42FCF23C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAC76F31-00A5-4719-AA50-92F773919B3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49996F5A-51B2-4D4E-AE04-E98E093A76CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F8406B0-D1E5-4633-B17E-53DC99FE7622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D49435C-7C33-454B-9F43-9C10F28A28A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17E1A0F-1150-4899-81BC-BE84E4EF5FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADD98AE-BAB0-440D-AB9F-2D76BE5109E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED44A404-8548-4EDC-8928-4094D05A6A38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A6E4AA3-BEBC-4B14-9A52-A8F8B2954D64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2AAD8F0-0D31-4806-8A88-A30E5BE43630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8164EE5F-6ABA-4365-8718-2F98C2E57A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7110AF9-A407-4EE2-9C46-E5F1E3638E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A06696D-37F0-427D-BFC5-1606E7441C31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9F8A5FC-5EFE-42EC-A49B-D3A312FB5F6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A76015-0A05-4EC7-B136-DC13B55D881F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54464F6C-9B2D-46BA-AC44-506389F3EE0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FA11017-EA58-45EE-8408-FCCCF7183643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5098A5-E4E8-47E4-8CD0-F607FF0C0C90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"442AD778-D56F-4C30-BBF8-749D6AAC4737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7D3F31-AF4D-4C50-8590-A763AAC7AF07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"445BFC2E-38FA-4130-8550-0866EC4EDA33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6DC2746-CE41-40C9-8CFA-23231BBCAE77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C3A8976-5E4D-490A-A87D-A47D1B2B903C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C8535E6-220E-4747-8992-45B6EAFC555C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7479B49-F484-4DF2-86CB-E52EE89FA238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6D68512-746D-4E95-857B-13A0B6313C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4312BA84-F9A0-4BD4-8438-058E1E7D6C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E52DF5-C713-4BC4-B587-FF6BDA8509CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"304ADCAC-9E49-42BD-BC92-58D9B2AD52E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB02172-B9A7-4801-88F2-98BF5843184A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5141380E-BD18-47C1-A84C-384BA821773D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AE6C49E-2359-4E44-9979-7D34F8460E35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C004B75F-37AF-4E61-98F3-1B09A7062DDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7126D19-C6D9-43CB-8809-647B1A20E7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CC98503-A80A-4114-8BF2-E016659BE84E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E6F4A7-24BE-4AA0-9CDD-84FBC56FE9BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3821412D-B010-49C4-A7B4-6C5FB6C603B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A34CA5CC-9EB1-4063-8B9D-3F566C1EFF76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CEB5D2D-FF54-4BDB-9E9C-8C1B2719FC9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD5B51A-AEA0-4DA2-BA60-94A2D5605352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96C6CA0-434D-428F-B629-A971C2937628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301AB72A-A6F2-42C8-A931-94EF2271443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59414B5A-05B8-49AF-A197-2A31729DDB65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFDD380-692F-41D7-996F-F97FC74DC7CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49602828-2BFC-4571-9F05-6210FD263DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87E03978-E16D-4A9B-8AE7-9F4F1171C14A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03096A9A-5758-47E6-81E2-BCFE847C41F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"150CC865-7975-45EC-BFF7-A94146442BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8FA1308-589B-432B-80F9-9A499D083ED5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2453E-30E1-4620-BEC5-21B0083449E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FE8DD05-D700-4F89-9B01-D489029DF7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050957CA-6191-4F9F-9D07-48B342B3B1B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACBF998-8B11-45C7-9017-486AED4FAE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9F2F3C4-FC94-414A-A208-913A43D57D75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641152EC-F4B4-4E5E-B396-AC4CAAB805BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4911E332-B8BA-4336-A448-3F70D2BBB147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"330EC403-3174-4543-9BBE-CEC0ABC1575D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EF585D0-507E-491E-9C3B-78EE26F2F070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD00F7C6-6762-4DC9-9F6C-5EAC4ACB1C54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5D885A-85C4-4A11-B061-61EFF6B6E329\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0502B59F-933C-4E25-A2EC-9296B197E139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D9C0A9-2DFF-4760-8FED-AC2DA7968E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A1BAEC-18BF-4607-BFB7-48102E75186A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49ED138-F42D-4451-A350-0B2DD5AB9444\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED91472-90FC-4AC8-96D5-1550A8502411\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57CEEFA6-CEED-4CA3-8DDC-B6601D69FB7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD25ECD-0605-4CD7-9DC5-294ACD7EF1B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2784E2AF-A5E5-4960-830C-B3EFB84043D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9112FA50-5527-4B20-80F5-2DE9E66D09F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CE4E2E-B2BF-409E-B18C-D67DA810FE9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B84D67-0B1D-4B74-BC85-AF8F933D8429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCA05A18-1523-4EED-9D2E-0A258A33F24F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C34E70EB-92F0-43F6-8883-FE422BE1A3FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78D301F1-20C2-4756-9A90-37F14835CE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EEC8B5-1CAB-4FBE-BBA2-D2FFA3EF9489\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA63B803-4D48-42E8-A793-F92ABCB8BFC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"129DB9CB-E878-4856-A954-15FFE1428636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"730DB4AA-FD7D-40C6-8D7F-19937832EF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07E86978-4820-422A-8C7C-FF0697DAED05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A7A9DB5-F544-4FD8-A9CC-0BD6257516AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF813AD9-D296-4915-861C-8DE929E45FE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A65469-083F-40B5-86C5-A2EAE5B2F00A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F1AA82E-BD86-40F5-B417-71DF6AF53A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B71A6DB0-5EB0-4712-8480-CF427F521D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8223D5A1-ADF1-43C6-AF91-EE5C413BCB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DD69605-F52B-4623-921A-983A5A408ECA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1D5685F-6FFE-4A6A-9FF8-940C8DA36499\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B94062D9-8DDA-4B4A-B3B5-07F71F5B97E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3832D0A6-419D-4876-B5C4-920578F713F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1AA5C8A-83A8-4F96-9D7C-7A50ADDB2341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"404E38E6-9EB3-41D0-97A7-DC579688BFB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40E4A921-AB28-47B7-B5A3-EB82193D15BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0357E48-2300-47B4-B9E5-9FE813A2FC09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96CC28B6-57D1-4919-AA55-A262CC16AFE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EB4C54D-1265-425A-B507-E1099844875A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97362147-3A71-430D-9064-4435D45C3B8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89212CF3-4E99-4389-94CE-F4211DDCA01B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBEA4DA3-0AFB-4FCE-92DB-5B316775BB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"611C0A0A-1FA3-42F9-82E8-BFCB71A077DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F027D9-DCB4-4A3D-8987-41F2941DBD45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23BCEC9-2BFB-4B41-9A7A-18B1347C6202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4924CE39-A846-4DB4-9547-6322FC5AD6B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C9E2C9A-94A1-456B-90D5-54932DF64C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC04C652-B2D8-4002-A50E-8AFE83204A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D413F0-CDBC-4A63-B9A7-9E7725BA1E83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"754A8826-59F7-4A71-B74B-737BE9C7DE4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADB6BDA-6825-489B-AB39-7729BA45DFD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7913F57E-E600-4767-AF51-D045E1898E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3783F4-5A05-45AA-9791-A681011FD78C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01E3114D-31D2-4DBF-A664-F4049D8B6266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8EE6578-981D-470C-BB24-4960B3CB1478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3320D50-C5C9-4D75-BF1A-5BB7BCBFE2BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE59839-8EB9-47FE-88E2-F0D54BE787A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75694A3D-080A-4AA7-97DF-5A5833C9D9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C5E27D-BBAB-4395-8FC6-8E3D4FB9A1EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E996176-3DEA-46E6-93B7-9C0DF32B59D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4417007D-126A-478B-87EA-039D088A4515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F78C2825-F6A3-4188-9D25-59EAEC8A7B0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF2FA85D-B117-410D-B247-8C5A3479319A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A041D27-132C-4B15-976F-1750C039A89F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D495E06-BF2B-4C5A-881D-94C93CD2BA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C31DFB8-8D8C-47D6-AAFF-BAE829A3D965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088BC395-06D5-4156-85EB-63C4A9552898\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33A220A2-A6D2-46A7-B168-607400EEDCE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E79232F-7196-440B-82D4-165885251232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED866954-77AB-4CA8-8AED-4252C595FC4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A1F516-B180-45D4-8EB1-754B7497CB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36758A04-64D3-4150-A004-CF042FA31CD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E01752E-F1DD-400A-A917-216CAF15B0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD47EC58-F776-4F59-8F15-4B208904CF4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3781F4-2123-4FA1-8AF5-D0D1E6C1A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94565E35-8A58-4CB6-A489-C796DCB97FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49964D35-5323-4412-BD54-661630F9A8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0A37E7D-1BF6-4A2A-BF52-5F0EC4B4F341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0F66468-87D0-41FC-934B-5924BE2956CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E0F93E1-4607-4DF4-AC6E-4B7254D4A8DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C0D99E-443E-4AB1-A07A-900A09FE177E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6D0FD76-C1FB-43D0-8511-FC0BA6DA7960\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9DAEE52-09C3-4A09-9958-9D6807B2700B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B97690D4-E814-4D40-B170-BE56D7AE2C1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89804F2C-D32D-4444-ABEA-5B241153D096\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AAAAF9C-B29B-4020-BAFF-C87B1A08294A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE60E1E-AB8D-46E4-A779-A54F2D20B5D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB958A28-7C9A-4BD0-B002-4E1A65CDB0A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C27B318-2AC1-423D-B0C8-583BB1800D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E58E3D0-1154-4B13-BA16-67CE67DF0637\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32D2ACB3-B906-4944-A021-03C4645965BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFF834A-D7F0-4E48-AD3D-DD0BCE6DEC0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E1A41BA-A1D6-484A-BAD2-68DF85598354\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11260C9D-69A9-4D81-9CCF-2E116DD75F7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020F06-FD27-46E3-A48F-3F60F33BB969\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C74F10-6A7F-4F68-8A34-E981E1760DE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24741B98-8D0E-4307-AAEF-A14B2531DCA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D4FA4BA-4304-4A70-9F86-120F2A3D8148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367FC8BA-F046-4264-A049-49E933E7698F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE9B68D3-1DFB-4468-85C4-AC13E6CBC111\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C966A016-B650-44D9-B8C4-1ED50AB318DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC448FF0-6D3F-4609-864B-4191905EE2B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC246FE-4CA6-4B2D-83C3-D50A386C24A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758A14DB-1BAF-442A-BA7C-5E9C67847BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61309100-CFA7-4607-A236-8910838AA057\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82D76265-7BD0-4C51-AE77-22B22524DE81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE38B195-BB8D-4747-881D-E8033760B4C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AA8BE76-168D-48A3-8DF6-E91F44600408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B656975-5D71-4712-9820-BDB7BC248AFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA045267-114D-4587-B6D7-E273C28DC9B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77018415-E122-406E-896D-1BC6CF790BE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADF37F1-546B-4EF0-8DEC-DC3B9F5309FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7469256-1A64-46FF-8F5A-A8E9E3CF5BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F9069B9-9FE3-4AD5-9A8E-55C0F73BD756\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E1C012-3E05-44DB-B6D2-BFD619C034B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15D689D6-8594-42F2-8EEF-DCAEBA885A67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6446000-0494-4DC5-ABAA-F20A44546068\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99B94EEC-6690-45D0-B086-F4A5B25C25CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B767B6E-B3E6-4424-97A6-89A7E7EB0EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"832AB3CD-E3A1-4CCB-A210-287973563D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A26C0CC-68AD-40F5-96B8-87E6C643F6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C4221A-9994-43B3-9C7A-E13815A50A10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20070B1D-B91C-40BA-A9D8-E80170A2933F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70129C9-371F-4542-A388-C095869E593A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C4DE25F-168A-4C67-8B66-09F61F072BD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58157F24-D89E-4552-8CE6-2F01E98BD1E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45ACBBEA-EC95-4F3E-B585-893DB6D21A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DEC55DF-1950-45E5-A5F2-B5604AFA1CBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6A5EC79-1B21-4BB3-8791-73507BC8D4DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB4AFC3-FE30-4F46-ADC1-D03EB14E757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0387587-AAB6-4284-8516-4DA3E3582D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A238C975-9196-449F-9C15-ABB2E9FD1D06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F17F4A5-120B-4E00-97C8-8A85841ACBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2537F047-64C9-4E73-B82C-310253184183\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A55857C-649D-46CE-AEDA-6E553E554FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA4892D-AFDF-4441-821E-5EBF7F64C9F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"327E06A3-7F0E-4498-8811-10C8D15398FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1624E6D6-858E-4085-B0B9-362B819EFD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50D61F4A-40F0-477C-8326-7359D3626E77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1455B4DE-7F1C-4CF2-AE02-2EDD20025D62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B215788-860B-46CD-9A08-43AFF98FAEAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B92FAD5-CA6E-48F7-9613-3A4CE90F5F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4EB132B-000C-4A17-AFB3-19F40A73D2CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4815AE-B635-4545-83C2-5EC4E0128337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0046C06-E3E6-4674-A4D1-332DD29D9552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C191851-3DC3-41C7-AD89-81F091CCC83A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21126922-8E81-47F4-82D4-CBCDDACEC4FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"209E18B0-BBB5-4C65-B336-44340F7740DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C867C0B8-91A4-482A-B7DD-54AB9599AE52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30F03843-8A51-4CE1-BE6C-994BDE3A8F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09854948-2657-4261-A32A-0523058F072E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D13904A5-266D-481C-A42A-734C3823A238\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC82FCB-0541-45C4-8B7E-CB612D7F702A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C18BD84-5E9C-4C9E-B0AA-2CEB0D7A58C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F5ABC7E-C4E0-4850-A1E6-07EBCF4A87D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"501E9355-0CDD-4951-BCC3-47962788BCCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3D976D9-62F0-43C3-8359-E51E26B6CD87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02AFBCD0-9B4B-4CA3-8FA9-D8B6ECB24894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64ADE9AF-196F-4E0B-BC66-7DE0183F9032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C90CCA48-1705-4564-AAF9-271201BD5113\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B82BAFF-17F5-465C-8032-67D5ECAB2921\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F694FEC-B97D-4BDA-ADFA-751E8BFB7CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F831371E-7437-48D7-8281-1F406215041B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC4F06B5-615A-464A-A0C4-7AABEE8530CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92AF503A-A2B1-4FC3-858B-264049ADF0F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E702C7EC-B1D9-4BDF-B334-2004CD76B52B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39F31D6-DC4B-46FE-BE5D-EA612D915A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51CB8036-5F36-4CD4-9B3E-D2401F2E64F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9849BA3-3990-4E30-B99B-ADD043314CDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A20FB18A-D3DA-4DE9-BEFF-75B7AB9B9A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A67CD6F-5E4F-4E69-A2A9-A4033DCE08EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A22E92-1EA7-45D9-AC86-EC3D9664C294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7FA2911-6561-47BF-BEE8-DDA31642C346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FA6CA23-6F2B-44D5-B2DA-4F142BA3E48A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F829DED-4D92-401A-BD80-C070DE57FC7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F560575C-FD8E-485D-B50A-572604BBE903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED8C51B-AE59-46DC-85F9-6D3B2891CB3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A38D00A-B9DC-44DF-8247-70355FF9A6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381EFC43-D5D9-4D10-90BE-4C333A9BA074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBEDED18-2755-4C55-A1A1-04B4D5F40276\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F04B57EC-0731-40C8-939F-1C686A65A0FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AB301FB-EB3E-4F5F-868D-5B66CC7E1E6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE1D28F9-B135-441B-A9BF-792DD356E374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D01CE3E-5C89-4FC0-9097-CAC483ACD441\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BDD55C4-AFCD-4DF2-921C-DDC1D7556DA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F52334F-BE6A-4FD4-9F63-AE9BB017115B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C9BCC3-B9A6-4195-BF2F-E7BBCE8DC269\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4DFFA7-AA0E-4D7E-97B8-13389FD47D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707F6671-57AC-4DF4-8024-444502E5C92E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C1FCE07-F9E8-4B14-95CE-01784D472128\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C208711F-FC06-46C8-8849-27054DC1B264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25AB8041-F201-4BB3-AAD9-199B06697DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75C474C-D5EF-42D6-9B2A-A504BEFCB982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F566CD3-3649-492B-B0AB-A107E51675B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB9F3D74-AE72-4FC5-83E9-890781AF3093\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8EA6A7-4AB8-487E-B5DD-9989CC5F1CD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF63DDC8-A0C1-482B-92F2-CF6135E8C2A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C69918C6-7AAD-4AA5-AB72-C275367B1008\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06155B0B-A5AD-4A82-8C02-D264981687A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76C19A4-FA26-432A-9443-9F92B2A946EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99BEE9BE-E49A-489B-B333-95D0993F8FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7427A678-EC47-4030-B905-619DD95F5A82\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86749716-1C9F-4C2A-B2A7-E62DEC10EA30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD000B53-06DA-4ED4-B0EE-9CB201B75C8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8424463-C329-4BAA-8AA1-25CD8B63292E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52727E62-0048-4C56-BC8C-B3450D257B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8223AA-F077-45FD-A7E3-3C2C1A8F6E91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAA34B50-2330-4D77-BF1A-6F05F3EF222C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6421F69-1076-43D2-B273-DE80FB2D5F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EDA9E2-CFE7-4917-BE48-A83208BDF0F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A34E7FC-93A4-45F2-A7B6-4A8ABFCAB0F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E611EDD-D44C-4311-B681-431D7C574528\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5E1B6AA-2F9A-43A8-9147-2BD9474E54C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1886D007-85B6-4E5A-968D-A1FD476A08A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDDDCB65-4404-49BC-9515-ECECD58A667F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D3E00-64C3-407A-9B00-8B6E383F73FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB1B00A1-9C15-47C2-9F57-66586DEACC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB5BF932-459F-4DD2-B160-5FE0371C7D83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A58ACE96-F1BE-4261-8F94-FC3C6E7C7561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783D6EA7-C016-4314-A87B-4FED1DC7114B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AD0176F-FFAE-4A85-9327-CE72FE059E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56970C7-F8D3-41B2-A78B-0C7F4A2A4E0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D4CE1F-86C8-4E48-9146-9DB57BF540FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB7F9D65-5537-4C25-B02B-2393F60D1299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09C8A92-820D-4572-A797-180E17A7DEB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA7D77A2-0D9A-4D0D-B0DC-152757917BE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07D3F1A-16CE-461F-A2F4-80FE5F841CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C04557A-C508-4FAD-A535-1C0AEFF08075\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AFAE489-6679-4705-BF9C-BB6D385A1DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429A99C8-BC55-4887-893C-7124C1A5DB08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3A2B709-CC19-4116-A5BE-5DB5C8B45A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D79DAC74-1F28-4EC8-B417-3FAFFB74C4BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1F1377-6220-43FB-BEF9-BAA7B0158147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18422CA8-3000-46B1-9065-2369E6B0BE16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D558C66-E80E-4FC7-A0DF-485466390C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23EA9AE-9E70-47B5-AD9B-0DF13A0939E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F22F6-4C87-47C5-965E-02A1AFF41A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A2CA86-BFA8-4C78-987D-AD26F32622F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF64E0A-CDB0-427E-A96F-095EFEBA0A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"425F6D34-EE60-464B-8EA6-8116EDAA1219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB9F657-1239-4424-A2E8-F8BD98C0095E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F631403C-0A67-42CB-815C-133EB87E0C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4A5A57-B1A2-4BBA-AC36-7EA7DF9CDE06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0453C0EA-BA67-49D5-964F-35493F97D905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D4D237E-ACB7-4382-AF5B-D27E634BF867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5461EB2-2958-4923-86AF-C74D449120B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45C22141-E698-4E38-AF50-9CE04C1168FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D0E470-427D-4A68-AFD2-982A4F7CE2D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43AB50F3-14AC-44BD-B7F0-A683C5FD1A3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"713C4B7A-C38A-4818-A258-D07DEDEC906E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C59740BE-FC30-4400-B978-1DB41282971C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839728F0-5F23-462F-B493-C37EE4C874F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F1B47DA-BA53-4D7A-9B5B-582238D5E99A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D452F1BF-1FA5-463C-8F13-6357509FB5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF6D1F4C-B396-468C-BA32-9367A68C95DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76A812F-D77A-49C8-B7A5-0C08258D4BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E001AAB-07EC-47BF-BDE9-BB927872781D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1DF11F5-61E8-4A98-86C8-49D6B3224FCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AED153E7-99A2-4C02-B81B-C3DDF8FAE1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D024802A-EA60-4D9B-B04C-027A0703EABD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA731F3C-1F04-4EE2-83EC-9486F5032903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"544A59F6-E731-43C8-8455-69256933E71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624258EE-7FFF-4432-9B6D-4D60AA73CD9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69A2701A-35A8-4268-B9CF-40BA3219373B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E671F6-8DED-4735-BE97-58A60E5B5C13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FC68B2A-8570-4311-BB60-49DBBDAF7430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9826FA02-937E-4323-B9D5-8AE059ADBE95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8630BB-48AA-4688-A6F0-212C1BB4D14C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC98D35-D7D5-4C24-B47E-EDE2A80B2B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F8ABCB-12C3-4C45-844E-B07F77DA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"326105AC-3926-437E-8AFF-916960107050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"866E1275-7541-4B80-8FDF-53246A204C15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E190929D-D3CC-46E1-A903-0848829061DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81E4EBCB-B660-4F6A-AD73-81B9D8964162\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D58CC5-CB46-464D-93B8-6AD5A19AF097\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16541D3E-EBBD-4D92-96D8-F169733377AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F08D257-F570-4D39-A6E8-0F60E55472E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20ED667-2BFB-41C7-82BA-9F0C0044DA08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6158ED8A-007E-48B7-99BF-8BA03BF584BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA7096A-F321-49A0-911A-F9683ABE6E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A471395-7F8F-4BA5-962D-4D8F271FAB47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9484380-92B9-44DB-8E20-DC8DE02D1CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8010808D-805D-4CA3-9EA2-55EB1E57964C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9716FE9F-A056-42A3-A241-F2FE37A6386A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73422A3-ECA0-4C41-9AA5-CF7D77885CF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A96A5AF-C9EF-4DED-AE25-4540A2B02915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5115B12-053A-4866-A833-D6EC88D8F93E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5619D4D-9685-4595-8A5F-A18273FE4213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B77E00E7-0EA4-4E32-A693-0E0F66BA4C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAA3457E-7E1A-4878-9752-79382E954A66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68630C63-4457-4E12-B7BD-AD456B237FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FB5695-2950-4CEC-81B4-FD280F835330\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F340AF8-508F-449D-9AFA-4E55F069B4F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E944410E-D674-4141-B50C-9F55090325FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6438E07-0AC0-4BF9-B0F2-9072CA9639D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5079AA70-C864-4AE2-809C-52B50632F2B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D124BCB-D8C3-49F5-B05C-E09B3CEBEBCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A86291B-C986-4320-BCEF-9F5AD8B309D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1227659F-1393-4189-978B-CC3DC53BF407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C2DB843-638F-41EF-B486-409318AA2DE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0004D8A-A186-4DA2-A7AB-18A6456438FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75B6BE9F-F113-4976-951D-53F2E183A95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB005F1-9719-4985-B9D9-2140C962ADD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A94D0C1B-F30F-4724-915E-192C53FAE58A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F247860-1D2C-415C-AFBD-26BD875AAF02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9697EDCD-A742-4AC6-876E-1080AD684207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E73924A-875B-44D0-8F7C-A822B0488126\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03751B92-EE07-4F16-A476-BD25561810BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A630E1-6CAE-4809-AB18-5002F158AE90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A67750FF-EF4B-414F-8ED4-299CAF33B0DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A82D885-82F5-4755-BC11-5899E28CEE42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88AF1366-8A14-4741-8146-886C31D8D347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FD75301-E29C-47DC-B53F-DC44EA0C1885\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C944024-BEAA-43AF-A339-FD69C75E8240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"435C69D1-3932-4379-8D18-B1E12D558325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3572B700-73C0-41D1-95FD-FE9D5B0C1F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A40DC9-0D4E-4C91-8D1B-3CED95B3952E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FB3E4B-05F8-411A-8C86-4ACE03815553\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E55EBC1-6F96-47CD-9503-7855EFB07240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4208DBA1-7F85-4876-9B6C-D1B43EAAB2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5ADC8E5-1CE7-4481-A9B5-61BFC6B4FF50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1789924-FADB-4076-8874-120B29EE6B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC246667-2F6F-4024-9EAA-2CE3018235C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B21BA7F8-D4B5-4E6B-8FCE-04BBD3501AA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1341A5D4-A5CE-4D31-A178-01C3069D7A55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86A5C199-92E5-435C-AC40-175849285104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67589F54-0A54-4DE7-9A47-A73DD05F7965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC34C8E-1BB9-43CC-9D89-9E6DC435B7EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BE5163E-9BCF-4BF8-BCB9-B48C4E7E1564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C5DC8C-3318-440B-8B29-4827F343927B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ECC47D8-F602-4CEA-B19A-209CE76C9D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7514ADD3-DECC-4CC2-9421-A609E526FDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED2EC97-8B2D-47A9-8EC7-D1E0ACBB6C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"691097C3-F91B-499B-BAEB-4E7E9C43B517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B3DB1ED-017B-43EF-92A3-A8A88669FBC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19A49AAF-0F08-4151-8F74-4EF9C3415B00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F7A2018-BB4D-4DC1-813D-A4AA3F270893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A95D91C4-C539-4458-A6C9-8AE17207AE30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37F9D218-8198-42C7-88FE-7C5382138324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF8FDD81-95EE-4241-93C8-925085A4CE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614D9E35-10E0-4CCB-B817-C7C8C3947BE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F75F987E-F4DB-46FF-B048-21B4A4C07B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05376F2C-30B6-406D-90F7-6C2E00E85171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCDD3DF6-24BF-4C13-8F07-AF07327E5622\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1520A64-2157-45D7-A135-F900798C4EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A30F85-5367-4369-B7A5-176D71279FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8803FF9-48D7-4AB0-8A17-4590CABD0BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DC63B6B-5D6D-477B-9125-007F835981B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF385AC9-963E-4670-95A6-BE1EBC3890B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"943FA088-2902-45A9-A1BA-D612B46A50D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C80902D-9A6C-47D4-B56F-35C378FC0E63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1100B46C-8485-4048-BFF8-2BAB311EC04A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9E1646-E154-41BA-B9FA-0839A898023D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03F4C8E6-0043-41A8-94EA-EEBAA1A081E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C10985-CBF7-4717-A7D6-2594887D7CB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C49886C-B6A0-4D95-8533-329FE5A66F6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0788CF23-3FAF-44C9-9AAA-96E4818A1AEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24AF7001-64D1-4BFB-9280-0BA0FAD97A0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6E420E-16DA-4FB1-9968-C93E229614FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07469E04-B3D2-41FE-A2E4-E25A977026CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60FF402E-5E4F-414A-A3AB-149548303616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79E2B875-A270-45C0-A1B1-041264E5B290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C828C8C-7ECB-4167-87A9-0F522C400C66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C2C887F-1EF7-468A-A6AE-440793C78DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F2F3D7F-D884-4ACD-A103-060F57A9867B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1FCAAD-7072-45EC-9ACB-08556458BAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4446224-40E8-4AD0-8197-921D3473E19B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4EA159D9-8C7F-4BE5-9093-A21C7D00F7EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92B68FD-771A-4401-8B1D-B1A252356F62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B933941-0BE3-4EEB-8FDD-2DAA63343EE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D060EF0-B29C-4B54-86A0-FD5CFF7B80BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F737C1-6011-42D2-9690-CA81EA0A283C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CA7EB6-D1C9-48D9-A69A-2618800A6CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CA1F3E5-ED7F-4E4C-AD0D-0EEC542A9E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED6E3C9B-A661-4B37-B76D-A3F7BD638D4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C909B0-8FB2-4220-AF93-EECB8D650CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF36BAD0-A762-4F84-BE0B-060FE666ED67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"007337CD-94FB-4ED9-B4A3-9E0EC52D79B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCDFA137-F1FC-46BD-9872-D62671B1434D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E6DBCB3-E912-43A1-914B-5C7CCFAADE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FCF36E2-0B42-4F23-97D6-9E79ECCA8FAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C67312-E128-4833-A91E-D7A9F96A7AD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F19F408-FABD-4A68-8CDC-C763F0321FB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68A06EC2-E491-4CD5-9904-61A88EBB7FD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"789A8CAE-8D9E-4244-880D-FBE28EC53AED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F901EE11-D0C9-46F6-8316-D8F4F1D50260\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E549F600-B9CE-4843-A772-2DACC528903E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F28E733-87ED-4610-A8EE-BD37BED7685B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DB488DD-D97C-4E21-A055-E6CECBBBC34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC12C97-9966-40E2-8B23-B4453EC9EA6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2832E8BF-7AC7-444C-B297-66F770860571\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44AA72FB-E78D-419E-AA82-B0538C6504D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"687C3BF3-D71A-49AD-8A05-EAC07CBCD949\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90AF90D9-16C4-4F8A-9868-3E2823E3445C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C063C53-8970-45B1-85F8-FB2080BF4695\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64596ED7-794A-4D23-987B-D9AD59D48EA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDA48F0-0F35-4A8F-8117-B0B28E00AB95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A561A8E8-79E2-4071-B57D-590C22EF86A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92E46658-60AB-4758-9236-3AC0E6464383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"207B8FBA-E2FF-485A-9AD9-E604AE0FB903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F99640-C753-40BE-A0A1-4C2D92E7DB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F98247B-1839-4676-855B-827A4B6C016B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDBA35BD-1048-4B6E-96B2-1CFF615EB49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CEEEE2-D6A2-4342-8A73-934093948824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"979FEE9F-A957-43B6-BB6D-1A851D6FA11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7AF59D-D05E-47F9-B493-B5CD6781FDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF7EC93-0170-45A9-86C7-5460320B2AE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8A7B1C2-D2CE-485A-9376-27E14F3FA05A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F803AC-DCC7-43FC-BEB3-AA7984E0506C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"560993AA-299D-42B7-B77F-1BD0D2114CCB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C582B1C-1DAC-48FD-82DD-7334C10A2175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7862B0C-2C44-4110-A62A-083116129612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048C5996-F719-4338-B148-0DD1C13E02FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B9FF7FB-AB5A-4549-8C15-E69458C649E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CEF6608-B650-4C77-9823-0AD57B3484F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE6A2D7-901C-45F9-B487-D674047D522E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADCB509-5B0E-4592-8B23-EC25A3F79D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB51691F-089F-4016-B25E-238074B06C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBAAC728-6A0F-4675-9677-AAF7DD5D38ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA37503-FD3D-4220-933C-234631D6EDEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72992831-2A76-456B-A80C-944BDD8591E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A79C2131-5566-4CC2-B6ED-38E3F6964500\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60BFDAA6-3DFC-4908-BC33-B05BAB462F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6266056-770A-4E2D-A4FC-F1475257648E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929AA8F3-8BDF-4614-9806-6D4231735616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605D7552-8184-4B11-96FD-FE501A6C97DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3144BBDE-CC96-4408-AA02-ECC3BF902A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8BA77A-34E3-4B9E-822A-7B7A90D35790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7165B43-ED22-4714-8FA4-1E201D1BFA69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CFB133-FAF0-431A-9765-8A9738D6D87C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2975B0F2-DB7C-4257-985A-482ED2725883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70221E07-3C2E-4A82-8259-AD583EB5CDDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"427DFD78-56CD-43C4-948E-F53AF9D669F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75AD7649-3FEA-4971-9886-6C9312B937A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4EE972C-6BAE-4342-BA01-1D685487F9C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27CDFE3B-C064-49A9-BD43-3F7612257A74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BD0EEC1-D695-41A5-8CD6-9E987A547CC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4DBF25B8-D474-4C6B-8E45-F57DDC7074E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF18FD1-6670-4C3C-8000-A079C69D575E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921EB5A5-F911-4FCE-A6F1-C66818B34678\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13878C13-1C7C-4B83-AF27-4998E8F659DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023063E1-2DD7-487C-A8A7-939FAEE666A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77255CE6-D7B7-4B48-993C-7100A1170BC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B40AC368-3A14-4EFF-A8D0-7EFB4C83045D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C07E80D5-70A5-49C9-9044-D683C7ECCFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63668AF4-F29C-4424-8EC5-2F0A5950DD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E86616FE-0C3F-4984-A364-8A6A9F01DAD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09C1C7CD-538D-4D7A-A81C-10DF5376A479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5922F749-2B23-44B8-8A46-F31BCAEAD279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C48BBAF-6B27-43D6-B86B-40CD8E7BA056\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D75D0EEB-707C-4C86-A569-E91E9F00BA77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0FB0E20-0243-40A1-8DEF-37150791222E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68CFF26D-8AD3-4179-9E4C-F06D7C858C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7541572C-229F-4963-B7F0-06EB3323E53B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479F7C77-D16F-4E40-9026-3EB8422E0401\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04DB08C8-0018-4A8E-A206-097BDDF83B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7193E85-30BE-42D5-A26B-3F88817F3574\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"446E8515-45FC-4B8B-8D12-60643D64C07F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBBDF6B2-D388-4639-87D8-064AA3F6B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AAB8B6-B614-4EAA-BA90-C5326CB5D07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A371DF9-E224-404F-99C2-C2A4607E62D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F40E356-365D-44B7-8C38-A0C89DDD6D3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3132029-89F8-4359-A0DC-A275785266A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02F5685-0636-48AB-B222-434CA1F3B336\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED4693C-DECF-4434-90C0-56158F102E7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB408A6B-0842-43DA-9180-B0A299FCBCE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6215EBAC-7C75-4647-9970-482120897F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1BD2B6-1AF6-4AD4-94FA-94B453A21908\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D1FD6E8-80EC-461F-9ED1-CE5912399E80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96F585E-BDEF-45EE-B0AB-94FE23753AC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3279C067-3058-4D46-A739-05404FD0E9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0855225-F501-486A-BD03-2A86FD252B5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"214C7B0C-C438-4000-9F9B-6D83294243AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C91AA2E-4BB2-49C8-9364-4E363DF42CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA26781F-5A1C-4DA5-835E-D984D697F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEA4222-F25D-4457-80AA-6D05CA918D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6777AC35-9D1F-4153-94AC-B25627D730E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F063F4-8994-4E46-BA7B-A12A112009BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6F2DE5-AF11-439A-8D37-30CB882ECD58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E213DD86-5419-42C8-BF38-7795DDB3C582\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A972291E-5231-439D-873B-2F87BCAF800A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C089CC54-3229-43D7-AA15-73CFA1A43EE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF268D83-C15D-4559-A46F-844E1D9264F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFE97C0D-3EA1-4314-A74A-7845C7778FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34293F29-F327-4ADD-BF62-78F63F79BB96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"528C0A46-1CC4-4882-985A-0BB41525BC6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"643F3522-A452-4927-944D-532574EC4243\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F40B78-4DBA-44EE-8420-086789EFF53D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"423BFD8F-4B50-43DA-9979-75FD18FBC953\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BAD4A68-0481-476F-BBBD-3D515331368C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"838CEB7C-7C4C-416C-86CE-6E8DD47EF25B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC7D021F-3C97-45B3-B1F7-0AC26959F22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A31AEF3-448D-417B-9589-4BA0A06F2FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A1D96F-7FFD-413F-ABCE-4530C3D63040\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B8343FE-1320-40AE-A37F-70EF1A4AC4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD42BA5A-7DA0-409D-8685-E43CF9B61D9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5FF80E9-CF28-4EF6-9CFE-4B500A434674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"647B77A4-2F49-4989-AF43-961D69037370\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B1E33-F279-4303-9DF3-C81039A40C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE7E0AAE-6539-4024-9055-BE0BAD702143\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F1A8828-0765-4799-AD6C-143F45FAAD23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D34618-1CCA-405B-A49C-EB384A09C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575D6061-66BC-4862-BC84-ECD82D436E2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B6EE64-1AD4-46B2-BA65-BB6282E56EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11650B45-0BDA-42BF-AEF3-83B48DD6A71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3C92BA-827B-48AF-BBB3-FB60A9053C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB44CA7-DFE6-4B1A-9A63-97AE30017E49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B305EFA-6226-412C-90EE-F0691F2DDDE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3874FA-63CB-4B5D-8B64-CE920320A4E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0800ED17-50E4-43F3-B46C-591DFA818BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A46B0405-F301-4209-8766-6E12EAFAD157\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99F9F1F-A967-4884-96CF-4488102DC0A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9B37AD-4599-425B-B39F-E571F4975266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5A5F1CF-A1E6-45F1-8B09-36566778DB57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"698C8A49-888B-4675-B3B0-25EDE2FD515E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D98F97-8EF4-48B5-84BE-C3CC27031FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B473D1FA-909B-492E-9C5B-94B0E20E1C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD5EA7E-322E-4CE6-89D4-7DB1055C9034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67836379-4E1A-45CD-9506-7D3F612E47C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B1BBC61-8664-4452-93A7-DDB4D2E4C802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044F0375-DF2F-4D9B-AD7E-473D34165E8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A0655CA-A88C-4632-9A18-560E3F63B2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6965851-3B29-4C21-9556-97FD731EAA85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52984FD2-44E0-4E91-B290-0376737EEF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF933366-7503-4F8D-B7AA-F6A16210EC37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E2DAF5D-5BB7-49C6-8426-8B547505B6FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EABB21D-D021-434B-B147-CAF687097A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7609424D-95F1-4493-A20C-B1BA4EC6439D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"966DC636-C802-4D9F-8162-652AFB931203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75794EB-A5AF-43F0-985F-D9E36F04C6D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31C2CFF0-98FD-4A0D-8949-D554B2FE53D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F9217F-5028-4659-AA8E-F60548DE4D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AC769DC-CF2E-4A3C-A610-264F024E6279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2B1CBF-D155-49BC-81A4-4172F177A5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370B2B32-519E-4373-8A04-5C5025D688BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D9B562-C279-4A55-A347-F28FC4F9CD12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A8C2BA0-48A8-4107-8681-A7C34C553D8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B009DE-A82F-4569-9B42-EC1EC4DA8A40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"683B6E83-37FF-4F9B-915F-059EBB29DB53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E218718F-4BE6-48B0-A204-9DD4A932A654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0AB327-B60A-473C-9D36-97766EE62D7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA249EE-4786-4E27-8787-5E8B88C2AEB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBD0529-1CF3-44E5-85B3-19A3323C9493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D664EE97-07EC-410F-94C3-AEAB2C6A627D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31DB981-03B1-4A84-8D87-CD407C3C149F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CBD155D-89D9-4677-A621-4D7613BE65C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02BD0D4-FFFD-4355-97D8-170362F10B9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6635781A-2651-4EF2-A5AC-AEEEE63FDE6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DCE6930-760A-48C0-B964-1E3ED6A8517C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E52DE90-DF96-4CE7-B8D1-226BA50E4D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8EB40E7-9B91-4106-B303-2B70AF395BFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAB0D5CD-8AF3-409D-96A7-718641D4B90D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E420B0B-0CD5-41C7-B25A-3DB856055F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B0C295B-0D63-4BE7-830D-D927E00C301C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"605C340D-2220-4669-B827-9009CB099E8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8791879D-2908-4F57-8DB3-6D24100A9108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E823DC5B-98BE-4656-BFBF-3A7018F8F213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64E8D558-ADE0-4358-9C76-7BD77BF23AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7973B3D0-F244-4E26-88F5-A2D9BF2E4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F5CB567-4F86-4466-BE4D-BFF557ACAE0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A52611B-6583-4660-90D7-C9472728072B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E80C6E89-B57C-47BB-8B95-50C03DFB3B96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9AB685B-FEE1-41EF-A046-1B34619E12A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB9F6724-967A-4AF0-9896-12BF6164B2CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC1116BF-12D7-47CC-98DB-18B200CF9C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBB28DE-726B-4AF0-88A5-35987E1E648B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1880E2B8-5E0E-4603-8D17-3ABA43D28179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FAFBB92-1917-4238-832B-195FBE418271\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DFDF3F-9A3F-42B8-99A1-A3F76B198358\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8778F972-BF34-482F-9FA7-71A77F6138E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F288BB0-FE7A-4900-B227-BE80E4F4AADF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E16338-A094-4CA9-B77F-6FE42D3B422C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E07AB33-5351-487D-9602-495489C7C0B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22115ED6-1707-4840-B0D1-AD36BC0C75A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C633BC-831F-4CB7-9D62-16693444B216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD501E1-E78F-44C6-8A13-C29337B07EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9085BA0B-B7E2-4908-90C0-B4183891C718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81971C2F-137A-4F11-8C93-3B99D4CD1B58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E0BDAC-398E-406B-B2DB-AE049D6E98B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AFDE6C-DE58-4C4D-882E-474EF6C3D934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"950C6BF9-AA47-4287-AC01-D183237490FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2355181D-D8EE-4F80-8280-13D5CBCF4779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5209343F-66B0-4DC0-9111-E2E64CFF7409\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"720109A6-B79E-48E1-9AE7-7708B154788E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82FF0DBD-AE13-4232-80F7-F4C2E2CC9721\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5E944ED-8C02-46B8-BF95-0CE4C352753B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77AEA3D1-4846-46E2-9B80-20B19F00DC11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1576978F-E93D-4A47-90B6-6A4E3A7DE558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D339FE5-001F-4005-88A5-CFFE37F9B63E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDABA86-497E-497E-A5BA-46F913A4840A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD886F4C-DB6F-4DDD-9807-8BCBB625C226\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4C454B7-E5F4-4AAE-B577-FD71FA002C8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BE2781-3A06-4D62-AC8B-68B721DA526B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA23772-2EB8-4BEE-8703-26D967EC4503\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72DC766A-B1F9-4B83-9F9B-CF603EE476BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA594740-43C5-4F42-BA5B-00CA8AE7BB60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"572B16E2-8118-43A0-9A80-5D96831D55FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB5C551-BADC-4A3A-93E5-2EBCA0704C51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5383B7A3-1569-4FEB-B299-B87CE8C8A87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A05BBDE0-6C47-4489-9455-7DA7D230ECA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1789AA69-EA31-44D1-82E6-228E48E18586\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A7D5FF-3B1F-4C64-BB81-7A349765520D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0498B3-393A-4C32-B338-E6014B956755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C451F752-6869-4AFA-BAE5-5C9A54427BF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83710FD1-099B-436D-9640-061D515E10BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"517B71CE-6156-40E1-B068-A2B733E205E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DEEEE5-5055-4CE1-962C-C5F075F4CC02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8718DDAB-3208-48CF-9BCE-54DA1257C16A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE1AA901-E822-4240-9D82-C9311E4F87B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CDE3DF-8E79-4997-94EB-B517FFCAE55C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A0DE13-EB0B-493B-BC84-3AEB3D454776\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1727697B-1F59-4E29-B036-C32E9076C523\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E69E827C-C0D0-46C7-913A-1C1E02CEAACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528F3F9-34DC-41DA-8926-382CB3EF5560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E452C262-5A8D-4D97-BC7F-A4F5FF53A659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D57BF69-D750-4278-98AA-976B0D28E347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76ADAE30-6CAD-4F5B-B6F7-C18953144C63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A25D792-E21D-43EE-8B9D-67DE066DE5DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C669783-C058-4B4F-BB9A-84B2C4682247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"159B088B-9A85-4CAA-854A-AA080E528F95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE74A94-FE8F-4749-A35A-AB7D57E24913\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"990AC341-0E67-4A81-87E9-EE3EFD9E847E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53BC18B0-58F1-4477-9978-CA7383C197FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474992FB-842D-4661-A565-44AF2CD78693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476E1B79-5342-4895-96D7-E97DFC1F5334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD318D5-89A6-4E28-939C-C5B61396806B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A32C7E89-32ED-4328-9313-FA7D3DDBDC58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2792EED8-2CBD-478E-BC09-05FE830B3147\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B1AF2F-6E48-4DBD-A60E-3088CA4C3771\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E1691D-65B3-45E4-A544-8B29E38D569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42F2703-B8AB-410E-AF7B-CD0BE777F061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31244C94-00A3-499C-A91A-1BEF2FB0E6B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"878FF6E8-8A6D-44CE-9DD1-2C912AB8A193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5078A95B-2BD8-4A37-A356-F53D1A53CB37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BFE67CD-DE53-4C4E-8245-35902AEFA6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F231D31-3AAD-4C5D-A225-D2DF94486718\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5998DF5D-E785-45EC-B8D0-1F4EC4F96D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EADFD013-0BFB-427C-98E6-F9E4774DCBC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58620B10-FEA6-456D-B6B5-2745F5DBE82D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4858A1F0-97F2-4258-AB98-027BF1EC5117\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C961A8B-EAFD-4F66-9432-BCC0D154ECCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"052DE6CD-A1E7-4E81-B476-66EF451061C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"751B3AC8-D45E-46B6-83D5-311B693F3C0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9588277A-0B97-4408-9CF7-11271CDAADD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FE854-85E5-4ED0-BFAF-2618C9053082\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E048B9BF-77C8-49F7-9F2D-9999F79BA264\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CD16D4D-E816-486D-96F4-5A2BF75B959F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"169C558E-1A83-47D5-A66B-035BD1DD56FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D683E509-3FB2-4175-BCAB-4EB1B5C04958\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCFA915-5445-4732-9F8F-D7561BA4177F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63A9FD98-C22D-48F6-87A1-60791C818A1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85F99F24-1783-4E6E-BE61-04C2E80356ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85289E4C-C813-4677-867D-EE8E98F4A1A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27C8150F-BEFA-406D-9F0D-E7CB187E26AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E807F90-819F-4103-B1F7-4CE46971BD63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD93203F-71B9-4F87-B5D8-FD273451C8A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E652C74-C48D-4F29-9E85-09325632443F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99158191-3013-4182-8A53-5DFCA1E2C60A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7E39A3E-7EAE-47C9-930B-58A980B73FC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFDA54BA-C00D-4890-9B7F-328257607B21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F5EFB1E-334C-4B55-8E2E-6AE19B34774D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8260DCA-2F0C-45F7-B35F-D489AF5639F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7778F81B-6D05-4666-B1D4-53DB0EC16858\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC6706A-61F7-4AA0-B2FF-0FFDF739A644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EF1B16B-02F2-4ECA-938E-B5CDCFC67816\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5501D8-1B0D-4F5A-AFD7-C63181D3281F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1751F0CE-A0D3-40E2-8EEC-D31141FE33A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FF9AFA7-BBE8-4229-94CB-5A9596728BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E23A777F-68A4-4217-A75A-4D8A27E6451A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"392A4337-11F6-4980-A138-4FDBCAD0EBA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2E9BB67-F1FF-4190-889F-78B965CCE934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35607317-0928-4297-A33E-D44BEE1BBEC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D48323B1-7FEB-451F-A064-23E7CE7F6403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5763189-7980-4A72-92C9-1908FE9E15EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C53ACD49-DA21-4DDE-A0AA-FCCD59D29886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4326D350-EBC2-48E6-A2C6-0499F6826CEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8594E6FE-B6DB-4343-B3DD-AEC19923DAF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BCADA00-E453-414D-9933-FCB43D21BBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E62212D9-F707-4A8E-AB2A-A3985E7A4049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"561755A8-8AAD-4F41-8266-747EFDAF2D55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F4BB0F-DAF4-479B-B78A-7929C151AA1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A207312E-1D35-4464-A111-22C4C793E146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9B16E32-07D5-445B-BAA5-4E4A0881BFC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CF08F6B-2ECB-414C-82D7-C06085BF8B10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21032BE3-74D8-4C3F-B461-158F475B6853\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F9AC992-59B7-44EE-9FF3-567AC48938AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B44B3BFF-649A-4C1E-9564-EFA007FA2BD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C04EDD71-15B3-4085-828C-BB7A43DBDCC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC1BA7AC-989B-4093-841A-C6D5978BF17F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1874F848-B15B-4369-A164-5FA11D2B9AFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E46F934-9765-43ED-88A7-A4778C99A976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"380A8F4F-7D1F-4F79-B555-E5AE18EF9F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8D5217E-9520-4FDB-9330-C8DC2CDDAA70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B206674F-1A34-470B-820C-05F9C37792CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63AE2051-9F8E-4477-8E1E-38A1E06AD247\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B39281F-990C-4AA3-9287-CCB5BA7E8AC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EDC0FCF-BD22-42AD-8044-9A64215B91CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0ED8AA-56D8-4CB6-A765-706BE87C9E30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA890C07-7940-4DF4-96FB-8F71A2EFE5C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95A34F0-0B74-4031-BC9E-CBC93665BE68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD3CF38-0DDD-4C1C-B420-4DE0B1C932CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BB22DF7-15CE-4340-A05F-BD39FCA41F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA72DC8-2E4E-453A-A3FB-20F31D32B973\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"758E45B6-7C7A-432D-891D-CB99077AE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06B3CDFF-B055-4BB4-98FB-DFF4B2E63A29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26D7A401-BCE1-4673-93C9-67F009B75A39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E62119B-2A65-4473-B570-F118614B0ED6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5319E0-909C-4688-AAA6-6A0B5D19FFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F83F9F9-D2DB-4D40-AD61-29E66B050B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91BE6238-312E-4CF7-9E74-48CB5603B0FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC09EB6D-7FAC-4B61-83A5-B0DC18D54EB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33BA1BE0-0A78-4E94-A619-35735C913180\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FDD838C-8037-49E1-BAB4-C1D7D29BB9D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24CA40FE-80C5-4A20-8219-CEF51F3162FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B10305C5-0C2C-48B7-A0AD-2B24AD722EBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E8F127-6EAE-4302-BD52-7C3FCCA307D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D675EA9-33E7-45ED-B6A9-7117AD2FEE26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6E468FE-73BE-4B20-B774-58EC7CD20CDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF6B19B-7D45-44B3-8524-407253B93EEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B803FAD-E54D-49FE-A078-029B8FFBBB98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC511505-ED67-45B4-B76C-56AB750C4408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A430C232-79EB-4264-AE24-41D4A2A5D990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A9E3D4B-A3DF-4858-8C64-0316B6E57435\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19108672-E1AA-41CC-B86C-061D3721C8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"200D36CF-AEDE-4183-8C54-748E6E5A3218\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CF13A44-5163-4282-8EE8-7DC05499B5E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"827C12CE-D87D-489D-ABA7-BE0405EC33D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16AA78F7-520B-4FFC-838C-DC74FEE8E13F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB2949C-4699-49EF-83EB-31199E0CE2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66C169DC-EEFE-4DE6-A3D0-65B606527240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD28227A-8888-43B2-BC41-8D54B49DA58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7984BAEA-4518-4E17-830E-B34D09648BD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C2214E5-491E-448F-A4B6-A497FB44D722\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AE93013-C262-46A5-8E77-D647881EE632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B53CEC-943F-4966-8EC1-CB2C6AD6A15B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEAC04A3-EBE3-406B-B784-A3547162ECE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15720FFE-B2A4-4347-BCD7-DFA6774C0B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50F46B0E-C746-44B4-B343-E3DCAB4B98DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE30903-4F75-4D71-A8BB-44D1099E9837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98311EAA-26C8-4092-8BE5-4E7BEAA68DD4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8CF348-811C-4342-ACB9-AFCABCC34331\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71998EC5-EC0F-496C-B658-3CD91D824944\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F19B2A-E7A1-4B97-AC40-02B0D3673555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB6387C9-C0A8-4B26-BC62-802775CD0AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFEB0164-77C2-4EC2-92FD-5FCE246119CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDB20210-337C-4220-8CA1-F4B2BC54EBC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F699569F-4F52-4CC0-90D9-CC4CBC32428A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBAED22B-D097-49C4-ADDF-4B3F3E1262D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7756B588-5A63-4508-8BDD-92DB8CB0F4AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"316E26AE-67A5-4E75-8F9B-ECF4A03AED51\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"588D4F37-0A56-47A4-B710-4D5F3D214FB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9070C9D8-A14A-467F-8253-33B966C16886\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"668E2252-2290-41B5-95AB-95FB6092FF8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBD9A6A2-3AE0-46A5-A953-1ADC280C16E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7511381A-142F-4EC4-9399-86BA8218A6AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"964B57CD-CB8A-4520-B358-1C93EC5EF2DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A602C5-61FE-47BA-9786-F045B6C6DBA8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2\",\"versionEndExcluding\":\"6.2.2-24922\",\"matchCriteriaId\":\"10B33948-510B-4F22-89BF-B5DE5F5C30E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1\",\"versionEndExcluding\":\"1.1.7-6941-1\",\"matchCriteriaId\":\"521AB96C-3C60-44E1-935E-C6037343A3DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C997777-BE79-4F77-90D7-E1A71D474D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"6.2-23739\",\"matchCriteriaId\":\"2F53AB67-1CFA-467B-B2B1-D2447886FECE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0C5120-B961-440F-B454-584BC54B549C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CCBDFF9-AF42-4681-879B-CF789EBAD130\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66FC24F8-1B82-40EC-856A-2EA1736FFE5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E2100A-F6C2-4B86-A4D0-08D998BEC86B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F65DAB0-3DAD-49FF-BC73-3581CC3D5BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C04C1B2-B0C7-402D-B79E-B0157E011B28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6334AF0-79FD-444D-BD41-DC8BF90A4109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"41E76620-EC14-4D2B-828F-53F26DEA5DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A7ED7DD-A7D2-4A71-8415-26103530AB2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*\",\"matchCriteriaId\":\"CE80FF2C-0075-4F00-938F-C2C267E950D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEF98D6C-3C80-4A42-B14B-22D69BC1F4C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*\",\"matchCriteriaId\":\"50E90625-DEB3-49D3-89B6-E9EEFFABD975\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E24E90D-6E89-439A-8418-440910C3F07C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"33AFC27C-16AF-4742-9891-2240A73C6602\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C10475-AE35-4134-BB87-45544A62C942\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"044039A3-2AC7-4685-B671-C9B9FFD4ED6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477B6938-2314-487E-BB35-354B335AC642\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2F2C6D-3F41-4C42-81E2-01A52AD035B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D44EBD85-6140-41CD-8D26-29554CD2FBA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87BC54A8-6CF9-453F-9008-72CBA8C62BC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17DD7CB1-76E8-41C3-86B8-E43ECBB5E6CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4437E468-F93D-4CE3-A156-06F631030A41\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03311F2A-30E6-474E-824A-281ED3DE86AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40B4D5CE-8DC1-4300-BCF0-71CFB4331B71\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23EADA1F-73E8-4E70-AF90-CE8D26552687\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FDE279-49C3-452A-B9B0-36199C221F95\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D591F3BE-13BB-4006-BE46-E975779DE5E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D90DFDC-0B90-4431-9A23-194A5BC651F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68D895EC-B0A9-4292-AC64-60673F72C765\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00CD88D-5649-403F-A55A-BD49427D30FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38768B2B-F1A3-4A76-8716-9520CA075F3D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E23102-964E-485D-8EFF-4B1BBFE6EDE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7173A6DC-4D4E-424C-A922-C16D67627834\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33B1374D-59E8-4FE5-AC6C-0323AB1DD60D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A891447-2F1D-48B4-AA47-3CB7EA4FDC7C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C1DF922-1F46-41A6-A367-E56DD8C4163D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08CC4E5E-2794-4893-9B45-E14A3F4CF159\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4FCA77-71D3-495E-BA2A-2953369E5DCC\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F926EFFA-6C44-4D99-B1EB-C9EAB63B6768\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F44360-2B5D-4154-9D58-8ACEEF99DF15\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1574ACD1-F5EC-47C9-97C5-A456E2C1D7F6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DD89499-E4BE-4ACD-878C-06EB2BD59FC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9111BA3B-6A12-4974-9B94-548F6968BB8C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A6E548F-62E9-40CB-85DA-FDAA0F0096C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6E9EF0C-AFA8-4F7B-9FDC-1E0F7C26E737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAAE5EC4-9BB6-42EB-9B20-9CC3FADB1C8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D74B2ACC-6043-40F3-AAEC-BAEC804C7C65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABE50478-AEA1-4DE3-9032-289DC6955634\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EDAE7D8-7902-46C6-AE2B-8AA76E84417F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D8E919-CFBD-466A-A519-9B509A4E3663\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA09162-3331-49F6-A183-DDBE51C7F0FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB43A6C2-20DD-437D-AE6C-00A20C760CFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F230367-F012-459C-AA19-38B2856C12A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8C44C9C-BA5D-42DD-968C-7D75795A1ABC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F51A0C40-1A6E-4955-A498-F94EBDCCE0A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91424832-CC0F-454D-A77B-3D438D17CAB2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9544FE3-45A5-4803-A682-305C7BE488E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2498F2D-5A4B-4893-84E3-1144C6A16F01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDE01550-016B-4BBA-9E56-FC18F0D52C82\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B39DD6E-EB5B-46AE-9F7E-C3AB8744DC33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DA86326-3959-40AE-8984-F01B6C49C846\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34215265-15D4-4662-9D8A-20E8F48560BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE66F952-2BDD-4700-AA3B-6CEF7EFBA4F7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6EF7D36-9416-4634-AC9F-4115560E450F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4D7BA0-3715-4E91-A63F-AEA251BA35F3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F9519E-5640-45EF-8D4D-65E81797B967\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E5A7C1F-3F46-4374-9F62-DC7B28020D86\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"236A1006-7E56-4D2A-A9AF-C11E98EFBA56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED51E38-43DC-4214-8011-A223D6C03486\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9901BBE2-F9C3-4F5E-82FF-9C84691BF148\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E67487D-73DA-4105-B4F8-41A1D54640DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772FFDA5-B054-4F97-A399-9A8E4B4830FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF2DB741-F0D0-4607-A40B-4A9BB97231BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B647A88-B245-4796-BE42-EEE78D06F500\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3622D879-BA40-48B1-89D5-608AA99333A1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"624F92AA-903D-4ADC-83BE-35B4EAE7F740\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"783D5428-AC98-4C58-AD6F-0D518B695529\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69097B1F-C3EC-42FA-8C69-32D9DC430611\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F1000E-ECF5-4952-BE18-53DEB7BA8135\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12165D80-E3BA-4254-A3C0-F9785ECEE6A6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8631B12E-CE9A-41D2-BE3E-1C2FAF513468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2378F6D3-FF9D-45AD-932C-9ED4B3FE8CFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF9E21E1-C9C6-4790-9C8F-153A0AA2120C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F999652C-BCCA-4EFC-B859-4D6D995267D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4BAB42-0A0A-480D-9DF2-7E99E45A12E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86F3E671-D5BC-4FDC-9878-A6FB248E2D1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E838BFB-784F-4E36-990E-F50F554FCD15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E9E5307-7E77-4002-95EF-7FE4AB32EBCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A537819A-95AD-406A-960B-A56DF4199B0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"962E3CCD-39B6-43DB-A922-CBFE1CA5431D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F097E450-3E21-429E-8EDE-A20A32E205E6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60030678-EC0C-4B4C-97DF-8B8EBE1DED97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A2FE4D0-D0BB-407E-9270-88269BE962C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"012D6DF0-E257-48B0-AF01-3226E6065590\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5EFEB19-FCBB-4B6B-BAD2-786608E95E07\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21FDD77C-F607-48A0-9D03-29CC232213D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A21D272B-5DA1-48C4-9C29-60FD1DA3B560\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADFF99F0-4651-4CC4-8CD5-01DF8929B10E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13C2D96C-0AC1-476A-9674-957745E134C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D06CE4B7-C9DE-4EAF-8F94-2381AC559959\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5EF7960-4750-4ADA-B0A6-5B454A6A77E4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:el_ppc_1000\\\\/wt_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EC378F8-533D-4F7C-99A3-0C2394C99172\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:el_ppc_1000\\\\/wt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A942215-96BB-4E0C-AFBE-3FF70719B15F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:el_ppc_1000\\\\/m_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8559D73D-1275-4275-93FD-77E252C5E4C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:el_ppc_1000\\\\/m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F8F8B95-79EB-437E-A9CB-B5C0A9E395F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"525798C3-7035-43D1-99FE-653797DECA3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9797EACE-8534-486F-A48B-7509F7906CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"658A8B84-8735-4CB8-9E9F-702786DD630B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC14F03D-4C8C-4EB5-A4B9-D1D7364796D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B25B0B2-FFA4-43E4-B61B-EC322E39B084\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92563152-F7DF-456A-828A-F225271F4B43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAC1465C-D4E4-40A8-BC36-FC5FD3F84EB6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"717629B0-0981-4233-89AB-AF234847B639\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3684354-FC1C-47A7-9AD7-00AF992B7605\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B804BA1-9CD7-45AE-B28D-01337A800213\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"054E26F9-188E-4F15-BB1A-8056639C69FF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C7A6530-9CBF-432D-BA7B-45772C325A02\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE73860-B3B8-4A96-8129-9AF45686F966\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D68B1755-4154-4648-980E-3B998B9621C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CFA0714-60D4-4D6E-95A6-3195F84F3F2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"18B811D9-EC0D-4623-AD5C-2757AD27604F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6C25A38-9F53-4AB9-A11F-9DF08D7CC9E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF2F5EFC-6FB1-44CC-A9FD-BAD6D6A29CD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C712CB21-C5C6-47E3-9C6A-E5E280E87062\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51D201C6-1DFD-4A0A-BCD7-024E5ADAFA0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8CC783-4144-422D-A154-72CC83D83E14\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FCEF736-BE5C-4BA9-80E0-304D55073F36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"592BE162-B9B4-4CCD-A5CB-4C316B14BFB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4548FEDD-22AF-4753-A805-0FAA8BA22410\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DD2E38F-01EA-4396-AE9E-B723FFA0E8D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DEB26DA-6CA5-4694-AB96-4E376C0D4018\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2EE280-6E1D-49C5-90B8-FA1940CC6E77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0ED092A-9CCC-4794-B8CC-531572B32F0B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2596D20-A6F7-4FE7-9E94-11965188DB68\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF7632B9-340A-4249-91B3-0C93232B3108\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD42607-7668-4ACC-94F3-E4C1F510EE38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC743E65-BFC2-4149-AB51-F529AB934296\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB0A1D10-B700-40A2-9A89-DDBD809294DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBED3056-BE7E-47DA-9818-4D57E29E7586\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67B75497-625B-44D2-8552-F8AA597EA6D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9B7B72-413E-4B2E-A68C-D5A748CA4CBD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766B3429-8B60-4774-BFCA-349F59846D6D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EC738BF-9BDB-4969-B00E-253D47C583D3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3452BB23-7A21-48F5-971F-9D8C92697B36\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45335605-EBA7-4C20-A334-A427656FD261\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"766841A0-9E9F-48A6-B815-467734AD7D68\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD355D0B-151A-457B-B0C9-7A6314315364\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"E1511A71-8E8B-4985-8A39-69C801D48BFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8D4A368-64AF-412B-B5BB-AD6BC84F95C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"13EA8C25-9918-456E-B0F5-206081207E98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"070D8D5D-0703-41BC-8D44-8379409D7CFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"0D54BE23-10D8-4FD2-9C0F-49785E55E28D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1402705D-BB4B-4639-92A8-B939B6AB3173\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"482C1848-4840-4CE4-B8C1-E387CA672AB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41507D57-119A-4EE6-8F3C-7DB635298F1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.1\",\"matchCriteriaId\":\"DDA0CBED-0140-4319-817C-CAE812EA5815\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74DC92AC-246D-4DA2-85B3-B33EA5839310\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2010\",\"matchCriteriaId\":\"E9C4333E-242B-472B-88A6-41669FCE48E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010_firmware:2010:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E84371B8-69B9-4C60-B1AE-9EA89E25961B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010_firmware:2010:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CBC4304-6AD9-4C12-B814-76CCCF9EBF0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010_firmware:2010:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"222D35AE-B32B-4167-9A6D-E88CCF3C823C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:siemens:simatic_winac_rtx_\\\\(f\\\\)_2010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6034789-ABD1-4035-8378-F0BA7157B087\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndExcluding\":\"8.5.9\",\"matchCriteriaId\":\"20740117-8BC1-47B8-AA10-8ADF91F1CA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0.0\",\"versionEndExcluding\":\"12.5.8\",\"matchCriteriaId\":\"133DFB76-70D7-4480-B409-2A657DF3B6AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B66C5256-6863-4B81-BC82-B76320467449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D98B374-B2FC-47C3-8376-B9F45664C436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*\",\"matchCriteriaId\":\"B75207AF-2BB8-4D6B-AF4C-BEB25895BA2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*\",\"matchCriteriaId\":\"4091C844-6778-46D2-B135-CD4E3FAA0714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3308A7-AF6A-4519-92E2-EF5FE6F9C78B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB2F377F-7260-47FE-9F50-40374EA1ED9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*\",\"matchCriteriaId\":\"B73A27AE-5483-4F59-9D03-1E65CEFB5EBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*\",\"matchCriteriaId\":\"67E6B861-B758-48C6-9B4E-CA348D4A8D11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D9AB99-4AD7-4765-9832-44180E038BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB2650C-DF46-498E-AD6E-549649A20849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE7D5CA7-2D77-4B44-AE53-DF07A9D3E43F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E9270E3-F4FC-43ED-BA80-67F321BF33C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*\",\"matchCriteriaId\":\"B687FC8F-DE82-446B-8EB1-3F3193735D26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B710A10-5076-4473-88AE-CA4A9935DF77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*\",\"matchCriteriaId\":\"432C66F0-03FA-4E0A-805F-7505B92C348B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B0B6D86-60E9-4193-8E8B-F07DF7410746\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*\",\"matchCriteriaId\":\"D17F3263-3107-4785-BF6B-8A62A13FC720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A86BD5F-3858-4E50-995A-CEBE0C0FC19C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB7F12A-3C70-41DC-B64F-990316118A07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1CF97B6-E3AE-47A6-A49F-3BFE66CB87F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*\",\"matchCriteriaId\":\"A644757F-6A6F-49F5-9B81-06F10C5E34EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*\",\"matchCriteriaId\":\"D84D5E4F-DDBA-42B7-974B-02DCB780E8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*\",\"matchCriteriaId\":\"979169D0-0C6E-4B4A-8FEA-FEBE33B09D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*\",\"matchCriteriaId\":\"20EB85A2-0051-430F-85B8-C2DA446E0AC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*\",\"matchCriteriaId\":\"12156ABC-3724-4F3E-9E38-7C2C896C48EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC573DAD-46D1-473A-B530-862DD301F287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*\",\"matchCriteriaId\":\"08A9F95B-6B7A-4CDE-94AC-3235ED59B1E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F30A0A-DC59-4BDE-9060-BE25E35A21BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B31963-6FA3-4EC8-9F95-A999EB95B3F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DE1928-2F1F-442C-9E10-080AD9BD8D48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52E2286-239F-4486-9FB1-40ABF2C3A4D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D8617AE-22D6-4A9A-864B-6B104AE19826\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AE60429-3163-4621-9973-9569C489D0F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*\",\"matchCriteriaId\":\"946564F5-90DF-47FB-B704-434222171F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B371375-2F70-4A5C-81A1-3D24236EE06C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D89D1FB-354B-4F47-9B68-BC88266C603D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*\",\"matchCriteriaId\":\"990EA9A7-AA65-41D9-BFC3-987DEB875AF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*\",\"matchCriteriaId\":\"45930839-7669-46B1-88A8-EC7448CFAA1E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*\",\"matchCriteriaId\":\"116EC72C-1639-4E89-8DA5-14F326D8E91D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*\",\"matchCriteriaId\":\"56ED6A51-50F6-4181-9FFB-411854102B44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*\",\"matchCriteriaId\":\"013566F1-27AD-408A-9ADE-3D88865FC560\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*\",\"matchCriteriaId\":\"B924FE54-CA68-4C95-A9DA-DD37F2B8D851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*\",\"matchCriteriaId\":\"953DC00C-C694-4AFF-AC8D-3EF8F7B2EA9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*\",\"matchCriteriaId\":\"71726A09-D9DE-4063-8B83-35F5E1C15C4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*\",\"matchCriteriaId\":\"466ADBAF-9B8A-4F46-A061-3892CDFE0BE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E9B1C7-54CF-4761-ACC4-85D706ECE6FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*\",\"matchCriteriaId\":\"7870F2CD-247B-4F1F-BE7E-B0A73210CB7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D439E5-9283-41F2-A68E-48C27648A4F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE762CF7-9B71-4E79-AF1F-077FF2584F3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*\",\"matchCriteriaId\":\"A86BD94F-D60A-4E5C-808D-F129B2C221F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*\",\"matchCriteriaId\":\"91CA06BB-2978-48E7-974C-AE588D0B773B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEC96D0F-56B5-4582-8519-5CFD59276221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8285D4D-9962-42CC-95C6-F5452EA62B11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*\",\"matchCriteriaId\":\"C715C51F-F1FC-4B92-BF77-EC75882CFE02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BA0B41-E7B7-469F-BEB1-73A6A3315BA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*\",\"matchCriteriaId\":\"26E44694-3121-4F50-9052-BAB42D6B45C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF156298-D57B-4F30-8895-C3DCE5D8FA7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*\",\"matchCriteriaId\":\"2485CC85-A58A-41A3-A0C3-F52C82D772A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB9206E-98ED-472F-8272-3DA2FEA82696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*\",\"matchCriteriaId\":\"83FEB3AF-DB9D-4958-AC26-04C694F0416A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A760D9-FEA2-49AD-8250-3A830398ECD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E6E75D-D814-4DAA-9759-6948955501DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEFD9527-F0CA-493B-A894-4BB26AB65F54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DC241D3-4352-4339-8C81-BA7878FD5062\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E50F31-00DB-4724-982E-E39E55E75FBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*\",\"matchCriteriaId\":\"1099C9B4-11A1-4545-8054-5CC247286617\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F018232-8B68-4496-A38B-6E1B84F1AA28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0F66CE5-E0BD-41B4-9D36-1C626FFF2141\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*\",\"matchCriteriaId\":\"08CB5270-1BD3-48D0-AB8C-B3CF0C52499F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC263338-15D1-4F8C-8BE7-494971F31682\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*\",\"matchCriteriaId\":\"061C95B9-845F-4235-9ABE-7BD5F555209C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*\",\"matchCriteriaId\":\"75EB3FC3-C4C1-4841-88E6-922CADC9B402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE0F78D7-2139-46AD-9C69-229BA94896D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*\",\"matchCriteriaId\":\"A630790E-2F77-4C05-91BD-06AB8894A28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A96EA60-16A8-4129-8E2E-B8B5C4F83D39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30EE76C-594A-4DD2-95D5-8E8D8B6D3185\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9A31A47-DE48-42AA-B7CD-4661624A50A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0CC39CC-45DF-4461-9219-808CBE68592A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAC6817-6316-4592-8510-02772D3EFF3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*\",\"matchCriteriaId\":\"711F5017-AEC2-4649-AA8A-6A596591F11C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*\",\"matchCriteriaId\":\"A12209C7-0027-46B1-A8D8-535A631A4FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D09CF29-38FD-487F-8597-518F206531BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*\",\"matchCriteriaId\":\"D35EAA15-0DEA-42D8-AEFE-F4CB6BC6CFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC12F16-071D-4648-A044-1274CBACE988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*\",\"matchCriteriaId\":\"0763BDFC-0D5D-43E0-BD3C-F6A7D41F53C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*\",\"matchCriteriaId\":\"57160A54-9049-4F31-AF1A-28A18F0EFF95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*\",\"matchCriteriaId\":\"54AD4072-BFAE-4941-8CC3-6DE5E3222DAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*\",\"matchCriteriaId\":\"9109EB3E-C635-4B99-9BE5-B9FD9C4B5D6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E01FEF6-8D64-428E-AFB0-FFEB21CCDC39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*\",\"matchCriteriaId\":\"910B3A6A-F418-4A0E-B612-DECD4900BB14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6B5E386-0BFC-4F1B-9D1A-E2F31C8A05BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*\",\"matchCriteriaId\":\"29175BA1-3A31-4E9E-8B52-B078CC33F51C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*\",\"matchCriteriaId\":\"573A99EF-0B6B-41D6-B71F-1C21B1565A3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*\",\"matchCriteriaId\":\"209AD390-0ABA-4225-9168-A769ED7808DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4553BE6-DEDE-4E16-A335-1F8DE5F7B9E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*\",\"matchCriteriaId\":\"5909ED7E-B49C-42D5-A634-788733D49FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B55E0E-8923-4779-970F-A335C708CD3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0B9CB8C-8072-46E3-8A6F-41FDB2365436\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C2C8471-D52C-41DF-A96B-E6D0A1E7A070\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2A9B43C-51F7-42C6-84CD-B882055915B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F239FF7-CA1E-4711-A8A8-C1F945366E19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E696E99-6F94-4C74-911A-01162CA34B15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B18A0A1-F28F-4282-B871-06344A674EDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2DA304-2C7F-4F5A-A3D0-0DF15E442B1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEF8BCE8-567E-4392-AD10-4DC4EF93E5CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8861F4-D390-4738-BBF0-9EE4684E9667\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B9D5E67-78C9-495E-91F0-AF94871E5FA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D35CDFE-F0E7-43F7-A307-E3BDDE5AEAD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADC13026-3B5A-4BF0-BDEC-B77338E427E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CBA70BA-FFCD-4D2D-AD26-95CC62748937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C92DD8B-8AB8-40D4-8E86-12FEB055D37A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*\",\"matchCriteriaId\":\"C58D77F5-CDB2-47DA-A879-BABEBE2E1E04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0C324FB-3989-4A4A-BF5B-C40CA698DDB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E7AC58E-D1F8-4FDF-9A28-61CF6158330A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*\",\"matchCriteriaId\":\"489EE0F6-5510-470E-8711-DC08B4AFB4F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*\",\"matchCriteriaId\":\"6719ED6F-CBC3-4B1E-9343-23DC3BA15FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDAA48A9-9319-4104-B151-D529E5EBF0F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*\",\"matchCriteriaId\":\"D16CD918-5075-4975-8B1E-21D8AD35A28E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A38CD8E-494D-4E0E-A300-8550FC81FAE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F40ABE8-8DED-4633-A34C-00DF5D510E71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*\",\"matchCriteriaId\":\"1736B975-089B-413C-8CA0-5524B957EF9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E4DCBF6-7189-497A-B923-08574443172C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*\",\"matchCriteriaId\":\"16FBA646-0B5E-44A7-BB12-29D5C611AEC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*\",\"matchCriteriaId\":\"29F57497-7B48-4D0C-B8F5-8D33062BECEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADDE96C7-C489-4D14-990B-8524627A23D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD82C093-FD98-45DE-9EE6-A05E81A1FEC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*\",\"matchCriteriaId\":\"08789F9E-CDC7-4F89-B925-92C9E3AE5234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*\",\"matchCriteriaId\":\"26ABB84C-B4BF-424E-8F4C-D2B6BE0AC79E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*\",\"matchCriteriaId\":\"621C203B-4B66-49CC-A35D-D7703109BF14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*\",\"matchCriteriaId\":\"3261BDEF-D89C-41D9-A360-EC36EAB17490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*\",\"matchCriteriaId\":\"5170A4F6-02B7-4225-B944-73DB5A4D332C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A97DBA-A56B-4F0B-B9C4-44B5166681AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*\",\"matchCriteriaId\":\"806C8BE6-A2BE-45BE-BEF2-396BEB16FCC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA6211E-134A-484E-8444-FBB5070B395D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E7B05B3-4076-4A44-B9A6-A44419F175C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A1636B4-6E79-42D7-AA62-5EE43412B43A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0377D0-BBED-41BF-80C5-58414ED413EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*\",\"matchCriteriaId\":\"6495283C-D18A-4DDA-852E-46F2273D6DAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*\",\"matchCriteriaId\":\"09DEFEE5-5E9E-4F3A-A245-3E8E2B291339\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B5A97A3-65DB-4697-9CF1-B4F5E4E4132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*\",\"matchCriteriaId\":\"17A84E0A-1429-467F-9EE1-FCA062392DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*\",\"matchCriteriaId\":\"C591163D-64BC-403B-A460-5B2258EC2F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED932B89-D34D-4398-8F79-AF98987CAFD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD365A0-0B09-4EC2-9973-691144C99507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE64DC7-A9D1-416F-89BF-D9F8DD8174AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E198AE4-A6A3-4875-A7DA-44BE9E1B280F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FDD5BA0-8180-484D-8308-B0862B6E9DC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A6EB9A-A908-42D1-A6BC-E38E861BBECE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*\",\"matchCriteriaId\":\"651EDCAA-D785-464D-AE41-425A69F6FFB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B3C704C-9D60-4F72-B482-07F209985E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1CFE956-4391-4B71-BD0B-96A008A624B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*\",\"matchCriteriaId\":\"409778CD-9AB3-4793-A5F5-8D8657F81442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EA75DB-B6BE-4E75-89B6-C69E96CBD7BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DC45A8B-6DE0-465F-9644-B75A09394F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A265671-BCB0-401A-A1E8-500F9D41492E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*\",\"matchCriteriaId\":\"83168067-1E43-4186-9B15-3FC702C6583C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C122DB4-8410-4C4E-87BE-EB3175CE182B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*\",\"matchCriteriaId\":\"C76ED78D-0778-4269-938E-BB7586C1E44E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1F78C5-E995-4E37-83C5-5B6A1D39E549\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A2E842D-AF37-4641-AD05-B91F250E7487\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07EAC87-32FD-4553-B71D-181F2C66AE68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6F0D62-4C51-46D6-A6C4-E479BE6B2C91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*\",\"matchCriteriaId\":\"865D3042-68ED-44B9-A036-9433F7463D6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC4FEF78-D2DA-4CCE-BB81-7E2090ED545C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*\",\"matchCriteriaId\":\"11AE3F61-9655-4B20-96E1-92112BE2BEDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECE35166-3019-450B-9C69-484E4EDE5A6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*\",\"matchCriteriaId\":\"D892B066-381B-4F46-8363-7BA1647BBCD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*\",\"matchCriteriaId\":\"710DB381-5504-4493-8D0A-17AB8E5A903B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*\",\"matchCriteriaId\":\"42AAA3B7-B74D-4B67-8BD3-1D9B5ED1E037\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*\",\"matchCriteriaId\":\"33CBCA55-010E-4E84-B2F8-F9B53D5A3340\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A73B4B-F9B3-4D66-9668-902902C73CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D14D51D-E2EA-4826-8C6E-AF1C15F12384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED100A1-9D59-48BE-91D4-0C8F2D678E6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*\",\"matchCriteriaId\":\"660B51F2-DFE0-49F6-AD2A-6E94B20F4019\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BF80536-348A-468E-AC1C-DA53632FCC83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFABF302-AC32-4507-BDD9-314854DE55BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EDE020F-4FB1-4F1D-B434-6745045702D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA1538B9-E860-46CE-A4CA-1393ECA20D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*\",\"matchCriteriaId\":\"386A6805-6167-47BA-A02F-073DC7E0FE36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*\",\"matchCriteriaId\":\"03BA15D8-F7A2-428C-8104-BCEBDE7C1EC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CFCFE7B-37E5-4C64-9B43-4F693F227231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*\",\"matchCriteriaId\":\"02CFAE22-37DB-4787-96FB-9E0F8EF671E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBA15143-734D-4889-8B5A-2445A2DDDD4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*\",\"matchCriteriaId\":\"04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D2ED442-3F6D-472A-AA98-51D05A65B2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A71EC72-3389-4EC7-8104-2A78F7B8C0DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*\",\"matchCriteriaId\":\"F948E806-0F73-4145-A723-7A43BA45842B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*\",\"matchCriteriaId\":\"75FAFF86-C65F-4723-8A63-BACE2F797937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBC31DE3-ACFE-422F-B253-2FE4AAFE3954\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*\",\"matchCriteriaId\":\"B30B3EA4-495F-4915-B6E3-5FB9277C2DE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FA9E337-B4F3-4895-BA58-962F8CDEE73E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*\",\"matchCriteriaId\":\"830B0BC1-A368-49AC-B6C9-B000972EF92A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*\",\"matchCriteriaId\":\"614394F3-3BEE-4E12-AABF-436D54A04313\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*\",\"matchCriteriaId\":\"350FD3CE-8B64-4FCF-82DE-BE941156F4F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9EAE177-6C7E-4C1B-ADEE-2C036F731272\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFEEC31-8462-4DF9-A1DA-D7057C209CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*\",\"matchCriteriaId\":\"942DAD67-9455-4D02-BD3B-BFD2DE7A7E52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ACC1A72-F6B6-430A-AB89-AB0A11587F58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*\",\"matchCriteriaId\":\"45111C74-BF6F-4C05-A0D3-CE325AD0C02B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1CE5849-01B1-4E36-83E8-496A3F328C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*\",\"matchCriteriaId\":\"A879BA05-3A80-4EBC-AA9D-9B53695425B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D65A0E8-A1E0-42F3-B77D-2F32979278BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*\",\"matchCriteriaId\":\"80C10150-39BA-4818-B48F-8645D4A0D316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*\",\"matchCriteriaId\":\"9792B986-86EF-40E0-9427-A45F858717E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*\",\"matchCriteriaId\":\"37EDD688-C91A-4A35-913A-82E156ADD242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*\",\"matchCriteriaId\":\"47DA50DA-7CA4-4B76-8B3B-A5732509F71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*\",\"matchCriteriaId\":\"76EB1A04-0645-4909-AEF9-33D6FADA4793\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A35723-D968-42D6-89EB-86CA550516E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3AC8A19-F98E-48F1-A1EA-EAA1C7208335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6A3952-8429-4762-8701-47D7C1F05A5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B007609-C312-469B-BACF-04D6D80DADF7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"155A0C39-4D0A-4264-B392-46002908939C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"514DE9F5-D826-42AA-B4CF-3EB09F4D3D5D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96AB8C81-F441-4563-B5E0-B738DF4D1C50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDA3C472-D1E9-47B3-AFD0-BD274E3291F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30BECA7-C45A-423D-9200-98D51BE9C84C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E376B2A-430D-4D1D-BC28-92CD7E1E8564\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4164A584-6F0D-4154-8FED-DC044CDE1FE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C9E6FC-9C40-4105-9FB0-17013E1ABBB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B37176F-0AF4-4410-9C1F-4C5ED0051681\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2F2936E-A611-472E-8EF0-F336A19DF578\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D200C1F-1909-4952-824F-A2D279B9B37E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC9F68C-7D65-4D29-AAA1-BA43228C6208\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/584653\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102371\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040071\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-254.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0292\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/speculativeexecution\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdrdv2.intel.com/v1/dl/getContent/685359\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-002\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-003\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"secure@intel.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180104-0001/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://spectreattack.com/\",\"source\":\"secure@intel.com\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX231399\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91229003\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/solutions/LEN-18282\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3549-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3580-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-2/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3516-1/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/43427/\",\"source\":\"secure@intel.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_01\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4609\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4611\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4613\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://nvidia.custhelp.com/app/answers/detail/a_id/4614\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/584653\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/102371\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040071\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://xenbits.xen.org/xsa/advisory-254.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0292\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/speculativeexecution\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cdrdv2.intel.com/v1/dl/getContent/685359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jun/36\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201810-06\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20180104-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://spectreattack.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Technical Description\",\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX231399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K91229003\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/solutions/LEN-18282\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3540-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3541-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3542-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3549-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3580-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3597-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/usn/usn-3516-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/43427/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.kb.cert.org/vuls/id/180049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.synology.com/support/security/Synology_SA_18_01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2018_0018
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0018", "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0018.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:40:07+00:00", "generator": { "date": "2024-11-14T23:40:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0018", "initial_release_date": "2018-01-04T13:06:10+00:00", "revision_history": [ { "date": "2018-01-04T13:06:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T13:06:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.4::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-358.84.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-358.84.2.el6.x86_64", "product_id": "kernel-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-358.84.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-358.84.2.el6.x86_64", "product_id": "perf-0:2.6.32-358.84.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-358.84.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-358.84.2.el6.src", "product": { "name": "kernel-0:2.6.32-358.84.2.el6.src", "product_id": "kernel-0:2.6.32-358.84.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-358.84.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-358.84.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-358.84.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-358.84.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src" }, "product_reference": "kernel-0:2.6.32-358.84.2.el6.src", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.4)", "product_id": "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.84.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src" }, "product_reference": "kernel-0:2.6.32-358.84.2.el6.src", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-358.84.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.4)", "product_id": "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.4.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T13:06:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T13:06:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T13:06:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0018" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.src", "6Server-optional-6.4.AUS:kernel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debug-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-devel-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:kernel-doc-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-firmware-0:2.6.32-358.84.2.el6.noarch", "6Server-optional-6.4.AUS:kernel-headers-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-0:2.6.32-358.84.2.el6.x86_64", "6Server-optional-6.4.AUS:python-perf-debuginfo-0:2.6.32-358.84.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0151
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update initial mitigations for IBM Power (PowerPC) and IBM zSeries (S390) architectures are provided.\n\n* Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 processors. (CVE-2017-5715, Important)\n\n* Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 and PowerPC processors. (CVE-2017-5753, Important)\n\n* Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. This fix specifically addresses PowerPC processors. (CVE-2017-5754, Important)\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754.\n\nThis update also fixes the following security issues and bugs:\n\nSpace precludes documenting all of the bug fixes and enhancements included in this advisory. To see the complete list of bug fixes and enhancements, refer to the following KnowledgeBase article: https://access.redhat.com/articles/3327131.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0151", "url": "https://access.redhat.com/errata/RHSA-2018:0151" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "https://access.redhat.com/articles/3327131", "url": "https://access.redhat.com/articles/3327131" }, { "category": "external", "summary": "1284450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284450" }, { "category": "external", "summary": "1442086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1442086" }, { "category": "external", "summary": "1493435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493435" }, { "category": "external", "summary": "1501215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501215" }, { "category": "external", "summary": "1504574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504574" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0151.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:39:41+00:00", "generator": { "date": "2024-11-14T23:39:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0151", "initial_release_date": "2018-01-25T11:17:48+00:00", "revision_history": [ { "date": "2018-01-25T11:17:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-25T11:17:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64", "product_id": "perf-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.17.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.17.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-693.17.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-693.17.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-693.17.1.el7.src", "product": { "name": "kernel-0:3.10.0-693.17.1.el7.src", "product_id": "kernel-0:3.10.0-693.17.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.17.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x", "product_id": "python-perf-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "perf-0:3.10.0-693.17.1.el7.s390x", "product_id": "perf-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.17.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.17.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64", "product_id": "perf-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-693.17.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.17.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "perf-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-693.17.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-693.17.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Client-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.src", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-693.17.1.el7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-693.17.1.el7.noarch", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "relates_to_product_reference": "7Workstation-optional-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "relates_to_product_reference": "7Workstation-optional-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Dmitry Vyukov" ], "organization": "Google engineering" } ], "cve": "CVE-2015-8539", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2015-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1284450" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s key management system where it was possible for an attacker to escalate privileges or crash the machine. If a user key gets negatively instantiated, an error code is cached in the payload area. A negatively instantiated key may be then be positively instantiated by updating it with valid data. However, the -\u003eupdate key type method must be aware that the error code may be there.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local privesc in key management", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernels as shipped with Red Hat Enterprise Linux 4 and 5. This issue does affect the kernels shipped with Red Hat Enterprise Linux 6, 7, MRG-2 and realtime kernels and plans to be addressed in a future update.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-8539" }, { "category": "external", "summary": "RHBZ#1284450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1284450" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-8539", "url": "https://www.cve.org/CVERecord?id=CVE-2015-8539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-8539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8539" }, { "category": "external", "summary": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096fe9eaea40a17e125569f9e657e34cdb6d73bd", "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=096fe9eaea40a17e125569f9e657e34cdb6d73bd" } ], "release_date": "2015-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: local privesc in key management" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "cve": "CVE-2017-7472", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-04-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1442086" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Linux kernel where the keyctl_set_reqkey_keyring() function leaks the thread keyring. This allows an unprivileged local user to exhaust kernel memory and thus cause a DoS.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: keyctl_set_reqkey_keyring() leaks thread keyrings", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 as the code with the flaw is not present in this product.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future Linux kernel updates for the respective releases might address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-7472" }, { "category": "external", "summary": "RHBZ#1442086", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1442086" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-7472", "url": "https://www.cve.org/CVERecord?id=CVE-2017-7472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-7472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7472" } ], "release_date": "2017-04-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: keyctl_set_reqkey_keyring() leaks thread keyrings" }, { "cve": "CVE-2017-12192", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493435" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Key Management sub component of the Linux kernel, where when trying to issue a KEYTCL_READ on a negative key would lead to a NULL pointer dereference. A local attacker could use this flaw to crash the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference due to KEYCTL_READ on negative key", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12192" }, { "category": "external", "summary": "RHBZ#1493435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12192", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2017/q4/63", "url": "http://seclists.org/oss-sec/2017/q4/63" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference due to KEYCTL_READ on negative key" }, { "acknowledgments": [ { "names": [ "Fan Wu", "Haoran Qiu", "Heming Cui", "Shixiong Zhao" ], "organization": "University of Hong Kong" } ], "cve": "CVE-2017-12193", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-10-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1501215" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of associative arrays introduced in 3.13. This functionality was backported to the 3.10 kernels in Red Hat Enterprise Linux 7. The flaw involved a null pointer dereference in assoc_array_apply_edit() due to incorrect node-splitting in assoc_array implementation. This affects the keyring key type and thus key addition and link creation operations may cause the kernel to panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7,MRG-2 and realtime kernels. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12193" }, { "category": "external", "summary": "RHBZ#1501215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12193", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12193" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12193", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12193" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Null pointer dereference due to incorrect node-splitting in assoc_array implementation" }, { "cve": "CVE-2017-15649", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1504574" } ], "notes": [ { "category": "description", "text": "It was found that fanout_add() in \u0027net/packet/af_packet.c\u0027 in the Linux kernel, before version 4.13.6, allows local users to gain privileges via crafted system calls that trigger mishandling of packet_fanout data structures, because of a race condition (involving fanout_add and packet_do_bind) that leads to a use-after-free bug.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Use-after-free in the af_packet.c", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6 as a code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15649" }, { "category": "external", "summary": "RHBZ#1504574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1504574" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15649", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15649" } ], "release_date": "2017-09-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:17:48+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0151" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Client-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Client-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7ComputeNode-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7ComputeNode-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Server-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Server-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.src", "7Workstation-optional-7.4.Z:kernel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-abi-whitelists-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-bootwrapper-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debug-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-ppc64le-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-s390x-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-debuginfo-common-x86_64-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-doc-0:3.10.0-693.17.1.el7.noarch", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-headers-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-kdump-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-kdump-devel-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:kernel-tools-libs-devel-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-0:3.10.0-693.17.1.el7.x86_64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.ppc64le", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.s390x", "7Workstation-optional-7.4.Z:python-perf-debuginfo-0:3.10.0-693.17.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Use-after-free in the af_packet.c" } ] }
rhsa-2018_0021
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise MRG 2.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0021", "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0021.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2024-11-14T23:40:27+00:00", "generator": { "date": "2024-11-14T23:40:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0021", "initial_release_date": "2018-01-04T16:50:09+00:00", "revision_history": [ { "date": "2018-01-04T16:50:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T16:50:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product": { "name": "Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:2:server:el6" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-6" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product": { "name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_id": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.606.el6rt?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product": { "name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product_id": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-firmware@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product": { "name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product_id": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.606.el6rt?arch=noarch\u0026epoch=1" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "product": { "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "product_id": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.606.el6rt?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src" }, "product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch" }, "product_reference": "kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch" }, "product_reference": "kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64 as a component of Red Hat MRG Realtime for RHEL 6 Server v.2", "product_id": "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "relates_to_product_reference": "6Server-MRG-Realtime-2" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T16:50:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T16:50:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T16:50:09+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0021" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.src", "6Server-MRG-Realtime-2:kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debug-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-debuginfo-common-x86_64-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-doc-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-firmware-1:3.10.0-693.11.1.rt56.606.el6rt.noarch", "6Server-MRG-Realtime-2:kernel-rt-trace-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-trace-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-debuginfo-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64", "6Server-MRG-Realtime-2:kernel-rt-vanilla-devel-1:3.10.0-693.11.1.rt56.606.el6rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0020
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0020", "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0020.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:40:13+00:00", "generator": { "date": "2024-11-14T23:40:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0020", "initial_release_date": "2018-01-04T15:26:01+00:00", "revision_history": [ { "date": "2018-01-04T15:26:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T15:26:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-220.76.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-220.76.2.el6.x86_64", "product_id": "perf-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-220.76.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-220.76.2.el6.src", "product": { "name": "kernel-0:2.6.32-220.76.2.el6.src", "product_id": "kernel-0:2.6.32-220.76.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-220.76.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-220.76.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-220.76.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-220.76.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-220.76.2.el6.src", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)", "product_id": "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.76.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src" }, "product_reference": "kernel-0:2.6.32-220.76.2.el6.src", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-220.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)", "product_id": "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.2.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T15:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T15:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T15:26:01+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0020" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.src", "6Server-optional-6.2.AUS:kernel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debug-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-devel-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:kernel-doc-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-firmware-0:2.6.32-220.76.2.el6.noarch", "6Server-optional-6.2.AUS:kernel-headers-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-0:2.6.32-220.76.2.el6.x86_64", "6Server-optional-6.2.AUS:python-perf-debuginfo-0:2.6.32-220.76.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0496
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution branch target injection (s390-only) (CVE-2017-5715, Important)\n\n* hw: cpu: speculative execution bounds-check bypass (s390 and powerpc) (CVE-2017-5753, Important)\n\n* hw: cpu: speculative execution permission faults handling (powerpc-only) (CVE-2017-5754)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* If an NFSv3 client mounted a subdirectory of an exported file system, a directory entry to the mount hosting the export was incorrectly held even after clearing the cache. Consequently, attempts to unmount the subdirectory with the umount command failed with the EBUSY error. With this update, the underlying source code has been fixed, and the unmount operation now succeeds as expected in the described situation. (BZ#1538587)\n\n* The Return Trampoline (Retpoline) mechanism mitigates the branch target injection, also known as the Spectre variant 2 vulnerability. With this update, Retpoline has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1543023)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0496", "url": "https://access.redhat.com/errata/RHSA-2018:0496" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0496.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:41:06+00:00", "generator": { "date": "2024-11-14T23:41:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0496", "initial_release_date": "2018-03-13T15:12:18+00:00", "revision_history": [ { "date": "2018-03-13T15:12:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-13T15:12:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:41:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:6.7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-573.53.1.el6.x86_64", "product_id": "perf-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.53.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.53.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-573.53.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-573.53.1.el6.i686", "product_id": "python-perf-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.53.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.53.1.el6.i686", "product": { "name": "perf-0:2.6.32-573.53.1.el6.i686", "product_id": "perf-0:2.6.32-573.53.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.53.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-573.53.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-573.53.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-573.53.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-573.53.1.el6.src", "product": { "name": "kernel-0:2.6.32-573.53.1.el6.src", "product_id": "kernel-0:2.6.32-573.53.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.53.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-573.53.1.el6.s390x", "product_id": "python-perf-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.53.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.53.1.el6.s390x", "product": { "name": "perf-0:2.6.32-573.53.1.el6.s390x", "product_id": "perf-0:2.6.32-573.53.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.53.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-573.53.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-573.53.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-573.53.1.el6.ppc64", "product_id": "perf-0:2.6.32-573.53.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-573.53.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.7)", "product_id": "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional EUS (v. 6.7)", "product_id": "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.src", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.src", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.7.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.7)", "product_id": "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.7.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-13T15:12:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.", "product_ids": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0496" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6ComputeNode-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6ComputeNode-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.src", "6Server-optional-6.7.EUS:kernel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-abi-whitelists-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-bootwrapper-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debug-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-i686-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-debuginfo-common-ppc64-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-debuginfo-common-s390x-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-debuginfo-common-x86_64-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-devel-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-doc-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-firmware-0:2.6.32-573.53.1.el6.noarch", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-headers-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:kernel-kdump-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:kernel-kdump-devel-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-0:2.6.32-573.53.1.el6.x86_64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.i686", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.ppc64", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.s390x", "6Server-optional-6.7.EUS:python-perf-debuginfo-0:2.6.32-573.53.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" } ] }
rhsa-2018_0182
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update initial mitigations for IBM Power (PowerPC) and IBM zSeries (S390) architectures are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, PowerPC, S390)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, S390)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, PowerPC)\n\nRed Hat would like to thank Google Project Zero for reporting these issues.\n\nBug Fix(es):\n\n* When attempting to reread parent blocks in btree traversal, the xfs code which deletes extended attributes from an inode assumed that the parent blocks were still on the cache. Under memory pressure and memory reclaim, such parent blocks were sometimes removed from the cache. Consequently, attempts to reread previously cached parent blocks caused the file system to read invalid memory. This update fixes xfs to reinitialize the pointer to the parent block buffers after the block has been reread. As a result, pointers to btree blocks now point to valid memory, and the kernel no longer crashes due to an invalid memory access. (BZ#1512811)\n\n* The write access check for huge pages did not function correctly on IBM z Systems. Consequently, if asynchronous I/O reads were used, buffers sometimes contained zeroes rather than data from a file, even when the io_getevents() system call reported that the associated read had finished successfully. This update fixes the write access check in the gup_huge_pmd() function in memory management, and read data is stored in asynchronous I/O buffers properly. (BZ#1513315)\n\n* With this update, the rule for iptables reloading has been optimized to complete faster. (BZ#1514040)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0182", "url": "https://access.redhat.com/errata/RHSA-2018:0182" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0182.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:40:24+00:00", "generator": { "date": "2024-11-14T23:40:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0182", "initial_release_date": "2018-01-25T11:59:45+00:00", "revision_history": [ { "date": "2018-01-25T11:59:45+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-25T11:59:45+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product": { "name": "Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:7.3::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "product_id": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "perf-0:3.10.0-514.41.1.el7.x86_64", "product_id": "perf-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.41.1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.41.1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "product_id": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-514.41.1.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-514.41.1.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-514.41.1.el7.src", "product": { "name": "kernel-0:3.10.0-514.41.1.el7.src", "product_id": "kernel-0:3.10.0-514.41.1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.41.1.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "perf-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.41.1.el7?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "product": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_id": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.41.1.el7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_id": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_id": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64", "product_id": "perf-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "product_id": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.41.1.el7?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "product": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "product_id": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.41.1.el7?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "perf-0:3.10.0-514.41.1.el7.s390x", "product_id": "perf-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_id": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "python-perf-0:3.10.0-514.41.1.el7.s390x", "product_id": "python-perf-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_id": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-514.41.1.el7?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "product_id": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@3.10.0-514.41.1.el7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.src", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode EUS (v. 7.3)", "product_id": "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.src as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.src", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3)", "product_id": "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.src as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.src", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 7.3)", "product_id": "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.src", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-514.41.1.el7.noarch as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-514.41.1.el7.noarch", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "relates_to_product_reference": "7Server-optional-7.3.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 7.3)", "product_id": "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "relates_to_product_reference": "7Server-optional-7.3.EUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-25T11:59:45+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0182" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7ComputeNode-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7ComputeNode-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.src", "7Server-optional-7.3.EUS:kernel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-abi-whitelists-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-bootwrapper-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debug-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-debuginfo-common-ppc64le-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-debuginfo-common-s390x-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-debuginfo-common-x86_64-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-doc-0:3.10.0-514.41.1.el7.noarch", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-headers-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-kdump-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-kdump-devel-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:kernel-tools-libs-devel-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-0:3.10.0-514.41.1.el7.x86_64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.ppc64le", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.s390x", "7Server-optional-7.3.EUS:python-perf-debuginfo-0:3.10.0-514.41.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" } ] }
rhsa-2018_0022
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0022", "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0022.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:39:54+00:00", "generator": { "date": "2024-11-14T23:39:54+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0022", "initial_release_date": "2018-01-04T17:04:18+00:00", "revision_history": [ { "date": "2018-01-04T17:04:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T17:04:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:54+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-431.85.2.el6.x86_64", "product_id": "python-perf-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "perf-0:2.6.32-431.85.2.el6.x86_64", "product_id": "perf-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-431.85.2.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-431.85.2.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-431.85.2.el6.src", "product": { "name": "kernel-0:2.6.32-431.85.2.el6.src", "product_id": "kernel-0:2.6.32-431.85.2.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-431.85.2.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch", "product_id": "kernel-doc-0:2.6.32-431.85.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-431.85.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-431.85.2.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-431.85.2.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.85.2.el6.src", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.5)", "product_id": "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.85.2.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src" }, "product_reference": "kernel-0:2.6.32-431.85.2.el6.src", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "perf-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.5)", "product_id": "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.5.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T17:04:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0022" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T17:04:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0022" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T17:04:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0022" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.src", "6Server-optional-6.5.AUS:kernel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-abi-whitelists-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-debug-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debug-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-devel-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:kernel-doc-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-firmware-0:2.6.32-431.85.2.el6.noarch", "6Server-optional-6.5.AUS:kernel-headers-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-0:2.6.32-431.85.2.el6.x86_64", "6Server-optional-6.5.AUS:python-perf-debuginfo-0:2.6.32-431.85.2.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0654
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nThe following packages have been upgraded to a later upstream version: kernel-alt (4.14.0). (BZ#1492717)\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, ARM)\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, ARM)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, ARM)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate)\n\n* kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate)\n\n* kernel: Incorrect updates of uninstantiated keys crash the kernel (CVE-2017-15299, Moderate)\n\n* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate)\n\n* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate)\n\n* kernel: Arbitrary stack overwrite causing oops via crafted signal frame (CVE-2017-1000255, Moderate)\n\n* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate)\n\n* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate)\n\n* kernel: Buffer overflow in mp_override_legacy_irq() (CVE-2017-11473, Low)\n\n* kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact (CVE-2018-6927, Low)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Google Project Zero for reporting CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754; Vitaly Mayatskih for reporting CVE-2017-12190; Kirill Tkhai for reporting CVE-2017-15129; Michael Ellerman, Gustavo Romero, Breno Leitao, Paul Mackerras, and Cyril Bur for reporting CVE-2017-1000255; and Armis Labs for reporting CVE-2017-1000410.\n\nAdditional Changes:\n\nSee the Red Hat Enterprise Linux 7.5 Release Notes linked from References.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0654", "url": "https://access.redhat.com/errata/RHSA-2018:0654" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html", "url": "https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/7.5_Release_Notes/index.html" }, { "category": "external", "summary": "1473209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473209" }, { "category": "external", "summary": "1495089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "category": "external", "summary": "1498016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498016" }, { "category": "external", "summary": "1498067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498067" }, { "category": "external", "summary": "1501794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1501794" }, { "category": "external", "summary": "1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "1525762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762" }, { "category": "external", "summary": "1525768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768" }, { "category": "external", "summary": "1531174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174" }, { "category": "external", "summary": "1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "1544612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0654.json" } ], "title": "Red Hat Security Advisory: kernel-alt security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T11:37:30+00:00", "generator": { "date": "2024-11-22T11:37:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0654", "initial_release_date": "2018-04-10T03:34:39+00:00", "revision_history": [ { "date": "2018-04-10T03:34:39+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-04-10T03:34:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:37:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-49.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-49.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-49.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-49.el7a.ppc64le", "product_id": "perf-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-49.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.14.0-49.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-49.el7a.ppc64le", "product_id": "kernel-0:4.14.0-49.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-49.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product": { "name": "perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product_id": "perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product_id": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-49.el7a.aarch64", "product": { "name": "python-perf-0:4.14.0-49.el7a.aarch64", "product_id": "python-perf-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-headers-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-headers-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-tools-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-tools-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-debug-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-debug-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-devel-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-devel-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.14.0-49.el7a.aarch64", "product": { "name": "perf-0:4.14.0-49.el7a.aarch64", "product_id": "perf-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-49.el7a?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.14.0-49.el7a.aarch64", "product": { "name": "kernel-0:4.14.0-49.el7a.aarch64", "product_id": "kernel-0:4.14.0-49.el7a.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-49.el7a?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:4.14.0-49.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-49.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-49.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-49.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-49.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-kdump-0:4.14.0-49.el7a.s390x", "product_id": "kernel-kdump-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.s390x", "product_id": "kernel-debuginfo-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-49.el7a.s390x", "product": { "name": "python-perf-0:4.14.0-49.el7a.s390x", "product_id": "python-perf-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-headers-0:4.14.0-49.el7a.s390x", "product_id": "kernel-headers-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "product_id": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "product_id": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-49.el7a.s390x", "product": { "name": "perf-debuginfo-0:4.14.0-49.el7a.s390x", "product_id": "perf-debuginfo-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "product": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "product_id": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-debug-0:4.14.0-49.el7a.s390x", "product_id": "kernel-debug-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.s390x", "product_id": "kernel-debug-devel-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-devel-0:4.14.0-49.el7a.s390x", "product_id": "kernel-devel-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.14.0-49.el7a.s390x", "product": { "name": "perf-0:4.14.0-49.el7a.s390x", "product_id": "perf-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-0:4.14.0-49.el7a.s390x", "product_id": "kernel-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-49.el7a?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "product_id": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-49.el7a?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-49.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-49.el7a.src", "product_id": "kernel-alt-0:4.14.0-49.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-49.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-49.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-49.el7a.src", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-49.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-49.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64" }, "product_reference": "perf-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x" }, "product_reference": "perf-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64" }, "product_reference": "python-perf-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x" }, "product_reference": "python-perf-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-49.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-49.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debug-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-49.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-49.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-headers-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x" }, "product_reference": "kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64" }, "product_reference": "perf-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x" }, "product_reference": "perf-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "perf-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64" }, "product_reference": "python-perf-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x" }, "product_reference": "python-perf-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64 as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" }, "product_reference": "python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "relates_to_product_reference": "7Server-optional-RHELALT" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "cve": "CVE-2017-11473", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2017-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1473209" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the mp_override_legacy_irq() function in arch/x86/kernel/acpi/boot.c in the Linux kernel through 4.12.2 allows local users to gain privileges via a crafted ACPI table.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Buffer overflow in mp_override_legacy_irq()", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security has rated this issue as having Low security impact. This issue is not currently planned to be addressed in future updates of the Red Hat products. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.\n\nThis attack requires \n\n- An attacker to be able to write to the ACPI tables ( local, privileged operation and non generalized attacks)\n- The ability for the attacker to reboot the system ( local, privileged operation )\n- The ACPI table changes to persist through reboots ( not common on cloud/serverless platforms )\n- This modification to the table alone is able to possibly corrupt memory, but the corruption will not be enough alone, the corrupted affected memory will be overwritten with valid acpi struct data which also has to corrupt the memory in which a way the flaw can create abuse (HARD).\n- The attacker will find it significantly difficult to abuse this a flaw in early-boot as injecting code/controlled execution at this point would require privileges. If an attacker had this specific privilege, there are easier ways to gain privilege escalation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-11473" }, { "category": "external", "summary": "RHBZ#1473209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1473209" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-11473", "url": "https://www.cve.org/CVERecord?id=CVE-2017-11473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-11473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-11473" } ], "release_date": "2017-07-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Buffer overflow in mp_override_legacy_irq()" }, { "acknowledgments": [ { "names": [ "Vitaly Mayatskih" ] } ], "cve": "CVE-2017-12190", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2017-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1495089" } ], "notes": [ { "category": "description", "text": "It was found that in the Linux kernel through v4.14-rc5, bio_map_user_iov() and bio_unmap_user() in \u0027block/bio.c\u0027 do unbalanced pages refcounting if IO vector has small consecutive buffers belonging to the same page. bio_add_pc_page() merges them into one, but the page reference is never dropped, causing a memory leak and possible system lockup due to out-of-memory condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak when merging buffers in SCSI IO vectors", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12190" }, { "category": "external", "summary": "RHBZ#1495089", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1495089" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12190", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12190" } ], "release_date": "2017-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak when merging buffers in SCSI IO vectors" }, { "cve": "CVE-2017-12192", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1493435" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the Key Management sub component of the Linux kernel, where when trying to issue a KEYTCL_READ on a negative key would lead to a NULL pointer dereference. A local attacker could use this flaw to crash the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: NULL pointer dereference due to KEYCTL_READ on negative key", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and MRG-2.\n\nFuture Linux kernel updates for the respective releases will address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-12192" }, { "category": "external", "summary": "RHBZ#1493435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1493435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-12192", "url": "https://www.cve.org/CVERecord?id=CVE-2017-12192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12192" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2017/q4/63", "url": "http://seclists.org/oss-sec/2017/q4/63" } ], "release_date": "2017-09-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: NULL pointer dereference due to KEYCTL_READ on negative key" }, { "acknowledgments": [ { "names": [ "Kirill Tkhai" ] } ], "cve": "CVE-2017-15129", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2017-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1531174" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in a network namespaces code affecting the Linux kernel since v4.0-rc1 through v4.15-rc5. The function get_net_ns_by_id() does not check for the net::count value after it has found a peer network in netns_ids idr which could lead to double free and memory corruption. This vulnerability could allow an unprivileged local user to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is thought to be unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net: double-free and memory corruption in get_net_ns_by_id()", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6 as the code with the flaw is not present in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15129" }, { "category": "external", "summary": "RHBZ#1531174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1531174" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15129", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15129" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15129" } ], "release_date": "2017-12-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net: double-free and memory corruption in get_net_ns_by_id()" }, { "cve": "CVE-2017-15299", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1498016" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the key management subsystem of the Linux kernel. An update on an uninstantiated key could cause a kernel panic, leading to denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Incorrect updates of uninstantiated keys crash the kernel", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5 and 6, as the code with the flaw is not present in the products listed.\n\nThis issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7 and MRG-2. Future updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15299" }, { "category": "external", "summary": "RHBZ#1498016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498016" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15299", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15299" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15299", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15299" } ], "release_date": "2017-09-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Incorrect updates of uninstantiated keys crash the kernel" }, { "cve": "CVE-2017-15306", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2017-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1510399" } ], "notes": [ { "category": "description", "text": "The kvm_vm_ioctl_check_extension function in arch/powerpc/kvm/powerpc.c in the Linux kernel before 4.13.11 allows local users to cause a denial of service (NULL pointer dereference and system crash) via a KVM_CHECK_EXTENSION KVM_CAP_PPC_HTM ioctl call to /dev/kvm.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: oops when checking KVM_CAP_PPC_HTM on PPC platform", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with\nRed Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-15306" }, { "category": "external", "summary": "RHBZ#1510399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1510399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-15306", "url": "https://www.cve.org/CVERecord?id=CVE-2017-15306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-15306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15306" } ], "release_date": "2017-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Kernel: KVM: oops when checking KVM_CAP_PPC_HTM on PPC platform" }, { "cve": "CVE-2017-16939", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2017-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1517220" } ], "notes": [ { "category": "description", "text": "The Linux kernel is vulerable to a use-after-free flaw when Transformation User configuration interface(CONFIG_XFRM_USER) compile-time configuration were enabled. This vulnerability occurs while closing a xfrm netlink socket in xfrm_dump_policy_done. A user/process could abuse this flaw to potentially escalate their privileges on a system.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-16939" }, { "category": "external", "summary": "RHBZ#1517220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-16939", "url": "https://www.cve.org/CVERecord?id=CVE-2017-16939" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16939" } ], "release_date": "2017-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation" }, { "cve": "CVE-2017-17448", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2017-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1525768" } ], "notes": [ { "category": "description", "text": "The net/netfilter/nfnetlink_cthelper.c function in the Linux kernel through 4.14.4 does not require the CAP_NET_ADMIN capability for new, get, and del operations. This allows local users to bypass intended access restrictions because the nfnl_cthelper_list data structure is shared across all net namespaces.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17448" }, { "category": "external", "summary": "RHBZ#1525768", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525768" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17448", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17448" } ], "release_date": "2017-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure" }, { "cve": "CVE-2017-17449", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2017-12-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1525762" } ], "notes": [ { "category": "description", "text": "The __netlink_deliver_tap_skb function in net/netlink/af_netlink.c in the Linux kernel, through 4.14.4, does not restrict observations of Netlink messages to a single net namespace, when CONFIG_NLMON is enabled. This allows local users to obtain sensitive information by leveraging the CAP_NET_ADMIN capability to sniff an nlmon interface for all Netlink activity on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6, as a code with the flaw is not present or is not built in the products listed.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-17449" }, { "category": "external", "summary": "RHBZ#1525762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1525762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-17449", "url": "https://www.cve.org/CVERecord?id=CVE-2017-17449" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17449" } ], "release_date": "2017-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity" }, { "acknowledgments": [ { "names": [ "Breno Leitao", "Cyril Bur", "Gustavo Romero", "Michael Ellerman", "Paul Mackerras" ] } ], "cve": "CVE-2017-1000255", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2017-10-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1498067" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s handling of signal frame on PowerPC systems. A malicious local user process could craft a signal frame allowing an attacker to corrupt memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Arbitrary stack overwrite causing oops via crafted signal frame", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel and kernel-rt packages as shipped with Red Hat Enterprise Linux 5, 6, and 7.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000255" }, { "category": "external", "summary": "RHBZ#1498067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1498067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000255", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000255" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000255", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000255" } ], "release_date": "2017-10-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Arbitrary stack overwrite causing oops via crafted signal frame" }, { "acknowledgments": [ { "names": [ "Armis Labs" ] } ], "cve": "CVE-2017-1000410", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519160" } ], "notes": [ { "category": "description", "text": "A flaw was found in the processing of incoming L2CAP bluetooth commands. Uninitialized stack variables can be sent to an attacker leaking data in kernel address space.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Stack information leak in the EFS element", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the Linux kernel packages as shipped with Red Hat\nEnterprise Linux 5.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-1000410" }, { "category": "external", "summary": "RHBZ#1519160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519160" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-1000410", "url": "https://www.cve.org/CVERecord?id=CVE-2017-1000410" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000410" } ], "release_date": "2017-12-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Stack information leak in the EFS element" }, { "cve": "CVE-2018-6927", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2018-02-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1544612" } ], "notes": [ { "category": "description", "text": "The futex_requeue function in kernel/futex.c in the Linux kernel, before 4.14.15, might allow attackers to cause a denial of service (integer overflow) or possibly have unspecified other impacts by triggering a negative wake or requeue value. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-6927" }, { "category": "external", "summary": "RHBZ#1544612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1544612" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-6927", "url": "https://www.cve.org/CVERecord?id=CVE-2018-6927" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-6927" } ], "release_date": "2018-02-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Integer overflow in futex.c:futux_requeue can lead to denial of service or unspecified impact" }, { "cve": "CVE-2018-1000004", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2018-01-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1535315" } ], "notes": [ { "category": "description", "text": "In the Linux kernel versions 4.12, 3.10, 2.6, and possibly earlier, a race condition vulnerability exists in the sound system allowing for a potential deadlock and memory corruption due to use-after-free condition and thus denial of service. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Race condition in sound system can lead to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the version of Linux kernel package as shipped with Red Hat Enterprise Linux 5. This is not currently planned to be addressed in future updates of the product due to its life cycle. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.\n\nThis issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7, its real-time kernel, Red Hat Enterprise MRG 2, Red Hat Enterprise Linux 7 for ARM 64 and Red Hat Enterprise Linux 7 for Power 9 LE. Future Linux kernel updates for the respective releases may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1000004" }, { "category": "external", "summary": "RHBZ#1535315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1535315" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1000004", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1000004" } ], "release_date": "2018-01-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-04-10T03:34:39+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0654" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-abi-whitelists-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-alt-0:4.14.0-49.el7a.src", "7Server-optional-RHELALT:kernel-bootwrapper-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debug-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-debuginfo-common-aarch64-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-debuginfo-common-ppc64le-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-debuginfo-common-s390x-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-doc-0:4.14.0-49.el7a.noarch", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-headers-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-kdump-devel-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:kernel-tools-libs-devel-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:perf-debuginfo-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-0:4.14.0-49.el7a.s390x", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.aarch64", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.ppc64le", "7Server-optional-RHELALT:python-perf-debuginfo-0:4.14.0-49.el7a.s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Race condition in sound system can lead to denial of service" } ] }
rhsa-2018_0464
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5.9 Long Life.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\n* Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\n* Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nRed Hat would like to thank Google Project Zero for reporting these issues.\n\nBug Fix(es):\n\n* Previously, the page table isolation feature was able to modify the kernel Page Global Directory (PGD) entries with the _NX bit even for CPUs without the capability to use the \"no execute\" (NX) bit technology. Consequently, the page tables got corrupted, and the kernel panicked at the first page-fault occurrence. This update adds the check of CPU capabilities before modifying kernel PGD entries with _NX. As a result, the operating system no longer panics on boot due to corrupted page tables under the described circumstances. (BZ#1538169)\n\n* When booting the operating system with the Kernel Page Table Isolation option enabled, the HPET VSYSCALL shadow mapping was not placed correctly. Consequently, the High Precision Event Timer (HPET) feature was not available early enough, and warnings on boot time occurred. This update fixes the placement of HPET VSYSCALL, and the warnings on boot time due to this behavior no longer occur. (BZ#1541281)\n\n* Previously, the routine preparing the kexec crashkernel area did not properly clear the page allocated to be kexec\u0027s Page Global Directory (PGD). Consequently, the page table isolation shadow mapping routines failed with a warning message when setting up page table entries. With this update, the underlying source code has been fixed to clear the kexec PGD allocated page before setting up its page table entries. As a result, warnings are no longer issued when setting up kexec. (BZ#1541285)\n\n* When changing a kernel page mapping from Read Only (RO) to Read Write (RW), the Translation Lookaside Buffer (TLB) entry was previously not updated. Consequently, a protection fault on a write operation occurred, which led to a kernel panic. With this update, the underlying source code has been fixed to handle such kind of fault properly, and the kernel no longer panics in the described situation. (BZ#1541892)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0464", "url": "https://access.redhat.com/errata/RHSA-2018:0464" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0464.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:40:59+00:00", "generator": { "date": "2024-11-14T23:40:59+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0464", "initial_release_date": "2018-03-07T15:23:36+00:00", "revision_history": [ { "date": "2018-03-07T15:23:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-07T15:23:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:59+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product": { "name": "Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:5.9" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.35.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.35.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.35.1.el5.src", "product": { "name": "kernel-0:2.6.18-348.35.1.el5.src", "product_id": "kernel-0:2.6.18-348.35.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.35.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-348.35.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-348.35.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-348.35.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-348.35.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-348.35.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-348.35.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-348.35.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-348.35.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-348.35.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-348.35.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.35.1.el5.src as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src" }, "product_reference": "kernel-0:2.6.18-348.35.1.el5.src", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-348.35.1.el5.noarch as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-348.35.1.el5.noarch", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.35.1.el5.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-348.35.1.el5.i386", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.i686 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "relates_to_product_reference": "5Server-5.9.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.9 server)", "product_id": "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64", "relates_to_product_reference": "5Server-5.9.AUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:23:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0464" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-07T15:23:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0464" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.src", "5Server-5.9.AUS:kernel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-PAE-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-PAE-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debug-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-debuginfo-common-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-devel-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-doc-0:2.6.18-348.35.1.el5.noarch", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.i386", "5Server-5.9.AUS:kernel-headers-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-debuginfo-0:2.6.18-348.35.1.el5.x86_64", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.i686", "5Server-5.9.AUS:kernel-xen-devel-0:2.6.18-348.35.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0512
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* hw: cpu: speculative execution branch target injection (s390-only) (CVE-2017-5715, Important)\n\n* hw: cpu: speculative execution bounds-check bypass (s390 and powerpc) (CVE-2017-5753, Important)\n\n* hw: cpu: speculative execution permission faults handling (powerpc-only) (CVE-2017-5754)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fixes:\n\n* If a fibre channel (FC) switch was powered down and then powered on again, the SCSI device driver stopped permanently the SCSI device\u0027s request queue. Consequently, the FC port login failed, leaving the port state as \"Bypassed\" instead of \"Online\", and users had to reboot the operating system. This update fixes the driver to avoid the permanent stop of the request queue. As a result, SCSI device now continues working as expected after power cycling the FC switch. (BZ#1519857)\n\n* Previously, on final close or unlink of a file, the find_get_pages() function in the memory management sometimes found no pages even if there were some pages left to save. Consequently, a kernel crash occurred when attempting to enter the unlink() function. This update fixes the find_get_pages() function in the memory management code to not return 0 too early. As a result, the kernel no longer crashes due to this behavior.(BZ#1527811)\n\n* Using IPsec connections under a heavy load could previously lead to a network performance degradation, especially when using the aesni-intel module. This update fixes the issue by making the cryptd queue length configurable so that it can be increased to prevent an overflow and packet drop. As a result, using IPsec under a heavy load no longer reduces network performance. (BZ#1527802)\n\n* Previously, a deadlock in the bnx2fc driver caused all adapters to block and the SCSI error handler to become unresponsive. As a result, data transferring through the adapter was sometimes blocked. This update fixes bnx2fc, and data transferring through the adapter is no longer blocked due to this behavior. (BZ#1523783)\n\n* If an NFSv3 client mounted a subdirectory of an exported file system, a directory entry to the mount hosting the export was incorrectly held even after clearing the cache. Consequently, attempts to unmount the subdirectory with the umount command failed with the EBUSY error. With this update, the underlying source code has been fixed, and the unmount operation now succeeds as expected in the described situation. (BZ#1535938)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0512", "url": "https://access.redhat.com/errata/RHSA-2018:0512" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0512.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-14T23:41:12+00:00", "generator": { "date": "2024-11-14T23:41:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0512", "initial_release_date": "2018-03-13T18:38:36+00:00", "revision_history": [ { "date": "2018-03-13T18:38:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-13T18:38:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:41:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64", "product_id": "perf-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.23.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "product_id": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.23.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_id": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_id": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.23.1.el6.i686", "product": { "name": "perf-0:2.6.32-696.23.1.el6.i686", "product_id": "perf-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.23.1.el6?arch=i686" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.23.1.el6.i686", "product": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686", "product_id": "python-perf-0:2.6.32-696.23.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.23.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-696.23.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-696.23.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-696.23.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-696.23.1.el6.src", "product": { "name": "kernel-0:2.6.32-696.23.1.el6.src", "product_id": "kernel-0:2.6.32-696.23.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.23.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x", "product_id": "python-perf-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_id": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_id": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "perf-0:2.6.32-696.23.1.el6.s390x", "product_id": "perf-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.23.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.23.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "product_id": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_id": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_id": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64", "product_id": "perf-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-696.23.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-696.23.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Client-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.src", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "relates_to_product_reference": "6Workstation-optional-6.9.z" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "relates_to_product_reference": "6Workstation-optional-6.9.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-13T18:38:36+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0512" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Client-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Client-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6ComputeNode-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6ComputeNode-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Server-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Server-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.src", "6Workstation-optional-6.9.z:kernel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-abi-whitelists-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-bootwrapper-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debug-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-i686-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-debuginfo-common-ppc64-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-debuginfo-common-s390x-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-debuginfo-common-x86_64-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-devel-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-doc-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-firmware-0:2.6.32-696.23.1.el6.noarch", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-headers-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:kernel-kdump-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:kernel-kdump-devel-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-0:2.6.32-696.23.1.el6.x86_64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.i686", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.ppc64", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.s390x", "6Workstation-optional-6.9.z:python-perf-debuginfo-0:2.6.32-696.23.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" } ] }
rhsa-2018_0016
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0016", "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0016.json" } ], "title": "Red Hat Security Advisory: kernel-rt security update", "tracking": { "current_release_date": "2024-11-14T23:40:33+00:00", "generator": { "date": "2024-11-14T23:40:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0016", "initial_release_date": "2018-01-04T05:49:20+00:00", "revision_history": [ { "date": "2018-01-04T05:49:20+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T05:49:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product": { "name": "Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product": { "name": "Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_rt:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product": { "name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_id": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-kvm@3.10.0-693.11.1.rt56.639.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "product": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "product_id": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-693.11.1.rt56.639.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "product": { "name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "product_id": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@3.10.0-693.11.1.rt56.639.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux for Real Time for NFV (v. 7)", "product_id": "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-NFV-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src" }, "product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch" }, "product_reference": "kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64 as a component of Red Hat Enterprise Linux Realtime (v. 7)", "product_id": "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" }, "product_reference": "kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "relates_to_product_reference": "7Server-RT-7.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:20+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0016" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-NFV-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-NFV-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-NFV-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.src", "7Server-RT-7.4.Z:kernel-rt-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debug-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-debuginfo-common-x86_64-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-doc-0:3.10.0-693.11.1.rt56.639.el7.noarch", "7Server-RT-7.4.Z:kernel-rt-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-devel-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-0:3.10.0-693.11.1.rt56.639.el7.x86_64", "7Server-RT-7.4.Z:kernel-rt-trace-kvm-debuginfo-0:3.10.0-693.11.1.rt56.639.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0010
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0010", "url": "https://access.redhat.com/errata/RHSA-2018:0010" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0010.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:40:00+00:00", "generator": { "date": "2024-11-14T23:40:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0010", "initial_release_date": "2018-01-03T23:16:37+00:00", "revision_history": [ { "date": "2018-01-03T23:16:37+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-03T23:16:37+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_e4s:7.2::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:7.2::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_id": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "product_id": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "perf-0:3.10.0-327.62.4.el7.x86_64", "product_id": "perf-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@3.10.0-327.62.4.el7?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product": { "name": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_id": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@3.10.0-327.62.4.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "product": { "name": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "product_id": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@3.10.0-327.62.4.el7?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "product": { "name": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "product_id": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@3.10.0-327.62.4.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:3.10.0-327.62.4.el7.src", "product": { "name": "kernel-0:3.10.0-327.62.4.el7.src", "product_id": "kernel-0:3.10.0-327.62.4.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@3.10.0-327.62.4.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.src as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.src", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 7.2)", "product_id": "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.src as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.src", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server E4S (v. 7.2)", "product_id": "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.src as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.src", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:3.10.0-327.62.4.el7.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch" }, "product_reference": "kernel-doc-0:3.10.0-327.62.4.el7.noarch", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 7.2)", "product_id": "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" }, "product_reference": "python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "relates_to_product_reference": "7Server-7.2.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-03T23:16:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0010" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-03T23:16:37+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0010" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.AUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.AUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.AUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.E4S:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.E4S:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.E4S:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.src", "7Server-7.2.TUS:kernel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-abi-whitelists-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-debug-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debug-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-debuginfo-common-x86_64-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-doc-0:3.10.0-327.62.4.el7.noarch", "7Server-7.2.TUS:kernel-headers-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:kernel-tools-libs-devel-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-0:3.10.0-327.62.4.el7.x86_64", "7Server-7.2.TUS:python-perf-debuginfo-0:3.10.0-327.62.4.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0017
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nVariant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important)\n\nVariant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0017", "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0017.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:39:49+00:00", "generator": { "date": "2024-11-14T23:39:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0017", "initial_release_date": "2018-01-04T05:49:35+00:00", "revision_history": [ { "date": "2018-01-04T05:49:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-01-04T05:49:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:39:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_aus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product": { "name": "Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_tus:6.6::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_id": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_id": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "product_id": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "perf-0:2.6.32-504.64.4.el6.x86_64", "product_id": "perf-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-504.64.4.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-504.64.4.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-504.64.4.el6.src", "product": { "name": "kernel-0:2.6.32-504.64.4.el6.src", "product_id": "kernel-0:2.6.32-504.64.4.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-504.64.4.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-504.64.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "product": { "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "product_id": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@2.6.32-504.64.4.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "product_id": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-504.64.4.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.src", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.6)", "product_id": "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.src", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server TUS (v. 6.6)", "product_id": "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.src", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.6)", "product_id": "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.src as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.src", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64 as a component of Red Hat Enterprise Linux Server Optional TUS (v. 6.6)", "product_id": "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" }, "product_reference": "python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "relates_to_product_reference": "6Server-optional-6.6.TUS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5715", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519780" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution branch target injection", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "RHBZ#1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5715", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5715" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution branch target injection" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-01-04T05:49:35+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0017" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.AUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.AUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.AUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.src", "6Server-optional-6.6.TUS:kernel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-abi-whitelists-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-debug-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debug-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-debuginfo-common-x86_64-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-devel-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:kernel-doc-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-firmware-0:2.6.32-504.64.4.el6.noarch", "6Server-optional-6.6.TUS:kernel-headers-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-0:2.6.32-504.64.4.el6.x86_64", "6Server-optional-6.6.TUS:python-perf-debuginfo-0:2.6.32-504.64.4.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
rhsa-2018_0292
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\n[Updated 4th September 2019]\nThe Problem Description text has been updated to fix a list of architectures addressed by the CVE-2017-5753 mitigation. No changes have been made to the packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.\n\nIn this update mitigations for IBM zSeries (S390), x86, and x86-64 architectures are provided.\n\n* Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important, S390, x86, and x86-64)\n\n* Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, S390)\n\n* Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, x86-64)\n\nRed Hat would like to thank Google Project Zero for reporting these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0292", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5753", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5715", "url": "https://access.redhat.com/security/cve/CVE-2017-5715" }, { "category": "external", "summary": "https://access.redhat.com/security/cve/CVE-2017-5754", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "1519780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519780" }, { "category": "external", "summary": "1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0292.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-14T23:40:29+00:00", "generator": { "date": "2024-11-14T23:40:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0292", "initial_release_date": "2018-02-09T12:57:26+00:00", "revision_history": [ { "date": "2018-02-09T12:57:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-09-05T07:46:33+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:5" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-426.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-426.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-426.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-426.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-0:2.6.18-426.el5.x86_64", "product_id": "kernel-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-426.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-426.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-426.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-426.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-426.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-426.el5.s390x", "product_id": "kernel-headers-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-426.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-426.el5.s390x", "product_id": "kernel-devel-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-0:2.6.18-426.el5.s390x", "product_id": "kernel-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-426.el5.s390x", "product_id": "kernel-debug-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-426.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-426.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-426.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-426.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-426.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-426.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-426.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-426.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-426.el5.i386", "product_id": "kernel-headers-0:2.6.18-426.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-426.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-426.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-426.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-426.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-426.el5.i686", "product_id": "kernel-devel-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-426.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-426.el5.i686", "product_id": "kernel-xen-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-426.el5.i686", "product": { "name": "kernel-0:2.6.18-426.el5.i686", "product_id": "kernel-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-426.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-426.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-426.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-426.el5.i686", "product_id": "kernel-debug-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-426.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-426.el5.i686", "product_id": "kernel-PAE-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-426.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-426.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-426.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-426.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-426.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-426.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-426.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-426.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-426.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-426.el5.noarch", "product_id": "kernel-doc-0:2.6.18-426.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-426.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-426.el5.src", "product": { "name": "kernel-0:2.6.18-426.el5.src", "product_id": "kernel-0:2.6.18-426.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-426.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-426.el5.src as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-426.el5.src" }, "product_reference": "kernel-0:2.6.18-426.el5.src", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-426.el5.noarch as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-426.el5.noarch", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-426.el5.i386 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-426.el5.i386", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-426.el5.s390x as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-426.el5.s390x", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-426.el5.i686 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-426.el5.i686", "relates_to_product_reference": "5Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-426.el5.x86_64 as a component of Red Hat Enterprise Linux Server (v. 5 ELS)", "product_id": "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-426.el5.x86_64", "relates_to_product_reference": "5Server-ELS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5753", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519778" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor\u0027s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution bounds-check bypass", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/security/vulnerabilities/speculativeexecution", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "RHBZ#1519778", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519778" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5753", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5753" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-09T12:57:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0292" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution bounds-check bypass" }, { "acknowledgments": [ { "names": [ "Google Project Zero" ] } ], "cve": "CVE-2017-5754", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2017-11-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1519781" } ], "notes": [ { "category": "description", "text": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "hw: cpu: speculative execution permission faults handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Please see the Vulnerability Response article for the full list of updates available and a detailed discussion of this issue.\n\nMeltdown patches for 32-bit Red Hat Enterprise Linux 5\n------------------------------------------------------\n\nRed Hat has no current plans to provide mitigations for the Meltdown vulnerability in 32-bit Red Hat Enterprise Linux 5 environments.\n\nFollowing many hours of engineering investigation and analysis, Red Hat has determined that introducing changes to the Red Hat Enterprise Linux 5 environment would destabilize customer deployments and violate our application binary interface (ABI) and kernel ABI commitments to customers who rely on Red Hat Enterprise Linux 5 to be absolutely stable.\n\nAlthough Red Hat has delivered patches to mitigate the Meltdown vulnerability in other supported product offerings, the 32-bit Red Hat Enterprise Linux 5 environment presents unique challenges. The combination of limited address space in 32-bit environments plus the mechanism for passing control from the userspace to kernel and limitations on the stack during this transfer make the projected changes too invasive and disruptive for deployments that require the highest level of system stability. By contrast, 32-bit Meltdown mitigations have been delivered for Red Hat Enterprise Linux 6, where the changes are far less invasive and risky.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-5754" }, { "category": "external", "summary": "RHBZ#1519781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1519781" }, { "category": "external", "summary": "RHSB-speculativeexecution", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-5754", "url": "https://www.cve.org/CVERecord?id=CVE-2017-5754" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5754" }, { "category": "external", "summary": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "category": "external", "summary": "https://meltdownattack.com", "url": "https://meltdownattack.com" }, { "category": "external", "summary": "https://spectreattack.com/", "url": "https://spectreattack.com/" } ], "release_date": "2018-01-03T22:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-02-09T12:57:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2018:0292" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "5Server-ELS:kernel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-0:2.6.18-426.el5.src", "5Server-ELS:kernel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-PAE-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-PAE-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debug-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-debuginfo-common-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-devel-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-doc-0:2.6.18-426.el5.noarch", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.i386", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-headers-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-kdump-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-debuginfo-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-kdump-devel-0:2.6.18-426.el5.s390x", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-debuginfo-0:2.6.18-426.el5.x86_64", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.i686", "5Server-ELS:kernel-xen-devel-0:2.6.18-426.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hw: cpu: speculative execution permission faults handling" } ] }
cisco-sa-20180104-cpusidechannel
Vulnerability from csaf_cisco
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "notes": [ { "category": "summary", "text": "On January 3, 2018, researchers disclosed three vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks. These vulnerabilities could allow an unprivileged local attacker, in specific circumstances, to read privileged memory belonging to other processes or memory allocated to the operating system kernel.\r\n\r\nThe first two vulnerabilities, CVE-2017-5753 and CVE-2017-5715, are collectively known as Spectre. The third vulnerability, CVE-2017-5754, is known as Meltdown. The vulnerabilities are all variants of the same attack and differ in the way that speculative execution is exploited.\r\n\r\nTo exploit any of these vulnerabilities, an attacker must be able to run crafted code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.\r\n\r\nA Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as operating system or hypervisor, is patched against the vulnerabilities in question.\r\n\r\nAlthough Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. Refer to the \u201cAffected Products\u201d section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.\r\n\r\nCisco will release software updates that address these vulnerabilities.\r\n\r\nThis advisory is available at the following link:\r\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel [\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel\"]", "title": "Summary" }, { "category": "general", "text": "Cisco is investigating its product line to determine which products and cloud services may be affected by these vulnerabilities. As the investigation progresses, Cisco will update this advisory with information about affected products and services, including the Cisco bug ID for each affected product or service.\r\n\r\nAny product or service not listed in the \u201cProducts Under Investigation\u201d or \u201cVulnerable Products\u201d section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable is explained in the \u201cSummary\u201d section of this advisory. Because this is an ongoing investigation, please be aware that products and services currently considered not vulnerable may subsequently be considered vulnerable as additional information becomes available.\r\n\r\nProducts Under Investigation\r\nNo products are currently under active investigation to determine whether they are affected by the vulnerability that is described in this advisory.", "title": "Affected Products" }, { "category": "general", "text": "The following table lists Cisco products and cloud services that are affected by the vulnerabilities described in this advisory:\r\n Product Cisco Bug ID Fixed Release Availability Network Application, Service, and Acceleration Cisco Cloud Services Platform 2100 CSCvh32644 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32644\"] Consult the Cisco bug ID for details Cisco Network Functions Virtualization Infrastructure Software CSCvh49919 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49919\"] Consult the Cisco bug ID for details Cisco Nexus 3000 Series Switches CSCvh32392 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392\"] Consult the Cisco bug ID for details Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode CSCvh32392 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392\"] Consult the Cisco bug ID for details Cisco Wide Area Application Services (WAAS) CSCvh49646 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49646\"] Update to v6.x (Available) Cisco vBond Orchestrator \u2014 18.2 (Available) Cisco vEdge 5000 \u2014 18.2 (Available) Cisco vEdge Cloud \u2014 18.2 (Available) Cisco vManage NMS \u2014 Cisco vSmart Controller \u2014 18.2 (Available) Network Management and Provisioning Cisco Application Policy Infrastructure Controller (APIC) CSCvh58549 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549\"] 3.2(1l) (Available) Cisco Evolved Programmable Network Manager CSCvh64005 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh64005\"] Consult the Cisco bug ID for details Cisco Virtual Application Policy Infrastructure Controller (APIC) CSCvh58549 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549\"] 3.2(1l) (Available) Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco 4000 Series Integrated Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco 800 Industrial Integrated Services Routers (IOx feature) CSCvh31418 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31418\"] Consult the Cisco bug ID for details Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1000 Series Aggregation Services Router with RP2 or RP3 (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1001-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1001-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1002-HX Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco ASR 1002-X Series Aggregation Services Routers (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco ASR 9000 XR 64-bit Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco CGR 1000 Compute Module (IOx feature) CSCvh32516 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32516\"] Consult the Cisco bug ID for details Cisco Catalyst 9300 Series Switches (Open Service Container or IOx feature) CSCvh44164 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44164\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June - 2018)\r\n Cisco Catalyst 9400 Series Switches (Open Service Container or IOx feature) CSCvh44165 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44165\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June - 2018) Cisco Catalyst 9500 Series Switches (Open Service Container or IOx feature) CSCvh44166 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44166\"] 16.6.3\r\n16.7.2\r\n16.8.1\r\n16.9.1\r\n(June -2018) Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) - Meltdown CSCvh32416 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416\"] 16.3.7 (June-2018) Cisco Cloud Services Router 1000V Series (IOS XE Open Service Containers) - Spectre v1, v2, v3 CSCvj59152 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152\"] A fix is pending on upstream vendors Cisco NCS 1000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco NCS 5000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco NCS 5500 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco Nexus 3500 Series Switches CSCvh32393 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32393\"] No fix expected Cisco Nexus 5000 Series Switches (OAC feature) CSCvh32394 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32394\"] Consult the Cisco bug ID for details Cisco Nexus 6000 Series Switches (OAC feature) CSCvh32390 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390\"] Consult the Cisco bug ID for details Cisco Nexus 7000 Series Switches (OAC feature, Feature Bash) CSCvh32390 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390\"] Consult the Cisco bug ID for details Cisco XRv 9000 Series Routers CSCvh32429 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429\"] Consult the Cisco bug ID for details Cisco c800 Series Integrated Services Routers (IOx feature) CSCvh51582 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh51582\"] Consult the Cisco bug ID for details Unified Computing Cisco C880 M4 Server CSCvh66783 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783\"] Consult the Cisco bug ID for details Cisco C880 M5 Server CSCvh66783 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783\"] Consult the Cisco bug ID for details Cisco Enterprise Network Compute System 5100 Series Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco Enterprise Network Compute System 5400 Series Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco HyperFlex with VMWare Hypervisor CSCvh68612 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh68612\"] HX 2.5.1d\r\nHX 2.6.1d\r\nHX 3.0.1a\r\n(Available) Cisco UCS B-Series M2 Blade Servers CSCvh31576 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576\"] UCS B-Series M2 Blade Servers - UCS Manager 2.2(8j) (Apr-2018)\r\nUCS Manager 3.1(3h) (May-2018)\r\nUCS Manager 3.2(3b) (May-2018)\r\nUCS C-Series M2 Rack Servers -UCS Manager 2.2(8j) (Apr-2018)\r\nIMC 1.4(3z08) (Apr-2018) / 1.5(9e) (Apr-2018)\r\n Cisco UCS B-Series M3 Blade Servers CSCvg97965 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965\"] UCS B-Series M3 Blade Servers\r\n3.2(3a)(Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M3 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nUCS Manager 2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(9n) (Apr-2018)\r\n Cisco UCS B-Series M4 Blade Servers (except B260, B460) CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Cisco UCS B-Series M5 Blade Servers CSCvh31577 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577\"] UCS B-Series M5 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nUCS C-Series M5 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nIMC 3.1(3a) (Mar-2018)\r\n Cisco UCS B260 M4 Blade Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS B460 M4 Blade Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS C-Series M2 Rack Servers CSCvh31576 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576\"] UCS B-Series M2 Blade Servers - UCS Manager 2.2(8j) (Apr-2018)\r\nUCS Manager 3.1(3h) (May-2018)\r\nUCS Manager 3.2(3b) (May-2018)\r\nUCS C-Series M2 Rack Servers -UCS Manager 2.2(8j) (Apr-2018)\r\nIMC 1.4(3z08) (Apr-2018) / 1.5(9e) (Apr-2018)\r\n Cisco UCS C-Series M3 Rack Servers CSCvg97965 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965\"] UCS B-Series M3 Blade Servers\r\n3.2(3a)(Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M3 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nUCS Manager 2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(9n) (Apr-2018)\r\n Cisco UCS C-Series M4 Rack Servers (except C460) 1 CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Cisco UCS C-Series M5 Rack Servers 1 CSCvh31577 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577\"] UCS B-Series M5 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nUCS C-Series M5 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\nIMC 3.1(3a) (Mar-2018)\r\n Cisco UCS C460 M4 Rack Server CSCvg98015 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015\"] UCS B260 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS B460 M4 Blade Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C460 M4 Rack Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\n Cisco UCS E-Series M2 Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco UCS E-Series M3 Servers CSCvh48274 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274\"] UCS E-Series M2 Servers - Single-wide: v1.5.0.7\r\nUCS E-Series M2 Servers - Double-wide: v2.5.0.5\r\nUCS E-Series M3 Servers - Consult the Cisco Bug ID for details Cisco UCS M-Series Modular Servers CSCvh55760 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh55760\"] No fix expected Cisco UCS S3260 M4 Storage Server CSCvg97979 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979\"] UCS B-Series M4 Blade Servers (except B260\r\nB460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nUCS C-Series M4 Rack Servers (except C460)\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\n2.2(8j) (Apr-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\nIMC 2.0(10i) (Apr-2018)\r\nUCS S3260 M4 Storage Servers\r\n3.2(3a) (Mar-2018)\r\n3.2(2f) (Mar-2018)\r\n3.1(3f) (Mar-2018)\r\nIMC 3.0(4a) (Mar-2018)\r\n Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvh58132 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58132\"] 11.6(1)ES3 11.5(1)ES8 (Available) Wireless Cisco Wireless Gateway for LoRaWAN CSCvh58504 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58504\"] Consult the Cisco bug ID for details Cisco Cloud Hosted Services Cisco Metacloud CSCvh53992 [\"https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh53992\"] Meltdown and Spectre variant 1 (v4.7) (Feb-2018)\r\nSpectre variant 2 (Apr-2018)\r\n Cisco Threat Grid \u2014 v2.4.3 (Available)\r\n 1 Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution.", "title": "Vulnerable Products" }, { "category": "general", "text": "No other Cisco products or cloud services are currently known to be affected by these vulnerabilities.\r\n\r\nCisco has confirmed that these vulnerabilities do not affect the following products or cloud services:\r\n\r\nCollaboration and Social Media\r\n\r\nCisco Meeting Server\r\nNetwork Application, Service, and Acceleration\r\n\r\nCisco vEdge 1000\r\nCisco vEdge 100\r\nCisco vEdge 2000\r\nRouting and Switching - Enterprise and Service Provider\r\n\r\nCisco 1000 Series Connected Grid Routers\r\nCisco 500 Series WPAN Industrial Routers (IOx feature)\r\nCisco ASR 1001 Fixed Configuration Aggregation Services Router\r\nCisco ASR 1002 Fixed Configuration Aggregation Services Router\r\nCisco ASR 1002-F Fixed Configuration Aggregation Services Router\r\nCisco Catalyst 3650 Series Switches\r\nCisco Catalyst 3850 Series Switches\r\nCisco Industrial Ethernet 4000 Series Switches (IOx feature)\r\nCisco Nexus 4000 Series Blade Switches\r\nCisco Nexus 9000 Series Fabric Switches - ACI mode\r\nCisco Cloud Hosted Services\r\n\r\nCisco Cloudlock\r\nCisco Managed Services\r\nCisco Meraki\r\nCisco Spark\r\nCisco Umbrella\r\nCisco WebEx Centers - Meeting Center, Training Center, Event Center, Support Center", "title": "Products Confirmed Not Vulnerable" }, { "category": "general", "text": "Details about the vulnerabilities are as follows.\r\n\r\nModern CPU Process Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can by triggered by utilizing branch target injection. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on a targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5715\r\n\r\nModern CPU Process Branch Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability due to the design of most modern CPUs could allow a local attacker to access sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to improper implementation of the speculative execution of instructions by the affected software. This vulnerability can by triggered by performing a bounds check bypass. An attacker could exploit this vulnerability by executing arbitrary code and performing a side-channel attack on a targeted system. A successful exploit could allow the attacker to read sensitive memory information.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5753\r\n\r\nIntel CPU Indirect Branch Prediction Information Disclosure Vulnerability\r\n\r\nA vulnerability in Intel CPU hardware could allow a local attacker to gain access to sensitive information on a targeted system.\r\n\r\nThe vulnerability is due to side-channel attacks, which are also referred to as Meltdown attacks. A local attacker could exploit this vulnerability by executing arbitrary code on the affected system. A successful exploit could allow the attacker to gain access to sensitive information on the targeted system, including accessing memory from the CPU cache.\r\n\r\nThis vulnerability has been assigned the following CVE ID: CVE-2017-5754", "title": "Details" }, { "category": "general", "text": "Any workarounds will be documented in the product-specific Cisco bugs, which are accessible through the Cisco Bug Search Tool [\"https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID\"].", "title": "Workarounds" }, { "category": "general", "text": "For information about fixed software releases, consult the Cisco bugs identified in the \u201cVulnerable Products\u201d section of this advisory.\r\n\r\nWhen considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page [\"https://www.cisco.com/go/psirt\"], to determine exposure and a complete upgrade solution.\r\n\r\nIn all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.", "title": "Fixed Software" }, { "category": "general", "text": "To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy [\"https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html\"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.", "title": "Vulnerability Policy" }, { "category": "general", "text": "The vulnerabilities described in this advisory were discussed in several articles and discussion forums as of January 3, 2018.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is not aware of any malicious use of the vulnerabilities that are described in this advisory.", "title": "Exploitation and Public Announcements" }, { "category": "legal_disclaimer", "text": "THIS DOCUMENT IS PROVIDED ON AN \"AS IS\" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.\r\n\r\nA standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.", "title": "Legal Disclaimer" } ], "publisher": { "category": "vendor", "contact_details": "Emergency Support:\r\n+1 877 228 7302 (toll-free within North America)\r\n+1 408 525 6532 (International direct-dial)\r\nNon-emergency Support:\r\nEmail: psirt@cisco.com\r\nSupport requests that are received via e-mail are typically acknowledged within 48 hours.", "issuing_authority": "Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.\r\nMore information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html", "name": "Cisco", "namespace": "https://wwww.cisco.com" }, "references": [ { "category": "self", "summary": "CPU Side-Channel Information Disclosure Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "category": "external", "summary": "CPU Side-Channel Information Disclosure Vulnerabilities", "url": "https://sec.cloudapps.cisco.com/security/center/viewAlert.x?alertId=56354" }, { "category": "external", "summary": "Cisco Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" }, { "category": "external", "summary": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "category": "external", "summary": "CSCvh32644", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32644" }, { "category": "external", "summary": "CSCvh49919", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49919" }, { "category": "external", "summary": "CSCvh32392", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392" }, { "category": "external", "summary": "CSCvh32392", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32392" }, { "category": "external", "summary": "CSCvh49646", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh49646" }, { "category": "external", "summary": "CSCvh58549", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549" }, { "category": "external", "summary": "CSCvh64005", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh64005" }, { "category": "external", "summary": "CSCvh58549", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58549" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh31418", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31418" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32429", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429" }, { "category": "external", "summary": "CSCvh32516", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32516" }, { "category": "external", "summary": "CSCvh44164", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44164" }, { "category": "external", "summary": "CSCvh44165", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44165" }, { "category": "external", "summary": "CSCvh44166", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh44166" }, { "category": "external", "summary": "CSCvh32416", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32416" }, { "category": "external", "summary": "CSCvj59152", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvj59152" }, { "category": "external", "summary": "CSCvh32429", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429" }, { "category": "external", "summary": "CSCvh32429", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429" }, { "category": "external", "summary": "CSCvh32429", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429" }, { "category": "external", "summary": "CSCvh32393", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32393" }, { "category": "external", "summary": "CSCvh32394", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32394" }, { "category": "external", "summary": "CSCvh32390", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390" }, { "category": "external", "summary": "CSCvh32390", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32390" }, { "category": "external", "summary": "CSCvh32429", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32429" }, { "category": "external", "summary": "CSCvh51582", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh51582" }, { "category": "external", "summary": "CSCvh66783", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783" }, { "category": "external", "summary": "CSCvh66783", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh66783" }, { "category": "external", "summary": "CSCvh48274", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274" }, { "category": "external", "summary": "CSCvh48274", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274" }, { "category": "external", "summary": "CSCvh68612", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh68612" }, { "category": "external", "summary": "CSCvh31576", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576" }, { "category": "external", "summary": "CSCvg97965", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965" }, { "category": "external", "summary": "CSCvg97979", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979" }, { "category": "external", "summary": "CSCvh31577", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577" }, { "category": "external", "summary": "CSCvg98015", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015" }, { "category": "external", "summary": "CSCvg98015", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015" }, { "category": "external", "summary": "CSCvh31576", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31576" }, { "category": "external", "summary": "CSCvg97965", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97965" }, { "category": "external", "summary": "CSCvg97979", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979" }, { "category": "external", "summary": "CSCvh31577", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh31577" }, { "category": "external", "summary": "CSCvg98015", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg98015" }, { "category": "external", "summary": "CSCvh48274", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274" }, { "category": "external", "summary": "CSCvh48274", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh48274" }, { "category": "external", "summary": "CSCvh55760", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh55760" }, { "category": "external", "summary": "CSCvg97979", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg97979" }, { "category": "external", "summary": "CSCvh58132", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58132" }, { "category": "external", "summary": "CSCvh58504", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh58504" }, { "category": "external", "summary": "CSCvh53992", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh53992" }, { "category": "external", "summary": "Cisco Bug Search Tool", "url": "https://bst.cloudapps.cisco.com/bugsearch/bug/BUGID" }, { "category": "external", "summary": "Cisco Security Advisories and Alerts page", "url": "https://www.cisco.com/go/psirt" }, { "category": "external", "summary": "Security Vulnerability Policy", "url": "https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html" } ], "title": "CPU Side-Channel Information Disclosure Vulnerabilities", "tracking": { "current_release_date": "2018-07-06T21:11:00+00:00", "generator": { "date": "2022-09-03T03:07:27+00:00", "engine": { "name": "TVCE" } }, "id": "cisco-sa-20180104-cpusidechannel", "initial_release_date": "2018-01-04T22:20:00+00:00", "revision_history": [ { "date": "2018-01-04T22:24:26+00:00", "number": "1.0.0", "summary": "Initial public release." }, { "date": "2018-01-04T23:26:00+00:00", "number": "1.1.0", "summary": "Clarified the non-vulnerable product section." }, { "date": "2018-01-05T20:52:29+00:00", "number": "1.2.0", "summary": "Updated Summary and Products Under Investigation, added the Vulnerable Products table with information about fixes." }, { "date": "2018-01-08T22:28:29+00:00", "number": "1.3.0", "summary": "Updated vulnerability details and information about products under investigation and products confirmed not vulnerable. Added the Vulnerable Products table, including information about fixed release availability." }, { "date": "2018-01-09T20:20:13+00:00", "number": "1.4.0", "summary": "Updated information about products under investigation and vulnerable products." }, { "date": "2018-01-10T21:32:05+00:00", "number": "1.5.0", "summary": "Updated the summary to indicate the status of Cisco cloud services and remind administrators to control user access. Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable." }, { "date": "2018-01-11T21:04:01+00:00", "number": "1.6.0", "summary": "Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable." }, { "date": "2018-01-12T21:22:52+00:00", "number": "1.7.0", "summary": "Updated information about vulnerable products, products under investigation, and products confirmed not vulnerable." }, { "date": "2018-01-15T19:52:57+00:00", "number": "1.8.0", "summary": "Updated information about products under investigation and vulnerable products, including fixed release availability." }, { "date": "2018-01-16T22:37:34+00:00", "number": "1.9.0", "summary": "Updated information about products under investigation and vulnerable products, including fixed release availability." }, { "date": "2018-01-17T22:03:45+00:00", "number": "1.10.0", "summary": "Updated Vulnerable Products section with fixed release availability and estimates." }, { "date": "2018-01-18T22:34:03+00:00", "number": "1.11.0", "summary": "Updated Summary section to provide guidance on updating underlying operating systems and hypervisors within virtual environments. Updated Affected Products sections and fixed release table." }, { "date": "2018-01-19T21:04:12+00:00", "number": "1.12.0", "summary": "Updated Products Under Investigation and Vulnerable Products." }, { "date": "2018-01-22T20:45:55+00:00", "number": "1.13.0", "summary": "Updated Products Under Investigation and Vulnerable Products sections. Removed UCS M5 server firmware release date. The UCS M5 BIOS updates have been removed from cisco.com at this time. Customers are advised to wait for the next revision of these updates before updating their devices." }, { "date": "2018-01-24T21:06:03+00:00", "number": "1.14.0", "summary": "Updated Products Under Investigation and Vulnerable Products sections." }, { "date": "2018-01-26T17:23:15+00:00", "number": "1.15.0", "summary": "Updated Vulnerable Products section." }, { "date": "2018-01-30T20:21:50+00:00", "number": "1.16.0", "summary": "Updated Vulnerable and Confirmed Not Vulnerable sections. Cisco Industrial Ethernet 4000 devices moved to Confirmed Not Vulnerable section." }, { "date": "2018-02-05T20:55:19+00:00", "number": "1.17.0", "summary": "Updated Vulnerable Products table." }, { "date": "2018-02-07T19:48:53+00:00", "number": "1.18.0", "summary": "Updated Vulnerable Products Table with fiximelines on a number of products." }, { "date": "2018-02-07T22:16:45+00:00", "number": "1.19.0", "summary": "Updated Vulnerable Products Table Fix information for E-Series servers." }, { "date": "2018-03-01T21:13:58+00:00", "number": "1.20.0", "summary": "Updated Vulnerable Products table with estimated availability dates for the delivery of fixed software for multiple products." }, { "date": "2018-03-07T21:57:52+00:00", "number": "1.21.0", "summary": "Updated Vulnerable Products table with estimated availability dates for the delivery of fixed software for Cisco UCS Servers." }, { "date": "2018-03-20T22:32:23+00:00", "number": "1.22.0", "summary": "Updated Vulnerable Products table with version information and estimated availability dates for the delivery of fixed software for Cisco UCS Servers." }, { "date": "2018-04-09T19:33:18+00:00", "number": "1.23.0", "summary": "Updated Vulnerable Products table with fixed version information for UCS M2, M3, and additional M4 models." }, { "date": "2018-05-15T17:10:59+00:00", "number": "1.24.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." }, { "date": "2018-05-22T18:30:08+00:00", "number": "1.25.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." }, { "date": "2018-06-05T18:00:09+00:00", "number": "1.26.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." }, { "date": "2018-06-08T18:55:52+00:00", "number": "1.27.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." }, { "date": "2018-06-13T18:39:34+00:00", "number": "1.28.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." }, { "date": "2018-06-22T18:11:46+00:00", "number": "1.29.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products. Added second defect for a selection of IOS XE-based products to cover independent fixes of Spectre and Meltdown issues." }, { "date": "2018-06-27T21:00:41+00:00", "number": "1.30.0", "summary": "Updated Vulnerable Products table with fixed version information for UCS E-Series M2 Servers." }, { "date": "2018-07-06T21:11:04+00:00", "number": "1.31.0", "summary": "Updated Vulnerable Products table with fixed version information for multiple products." } ], "status": "interim", "version": "1.31.0" } }, "vulnerabilities": [ { "cve": "CVE-2017-5754", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-01-04T16:54:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Intel CPU Indirect Branch Prediction Information Disclosure Vulnerability" }, { "cve": "CVE-2017-5753", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-01-04T16:50:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Modern CPU Process Branch Prediction Information Disclosure Vulnerability" }, { "cve": "CVE-2017-5715", "notes": [ { "category": "general", "text": "No additional information for this vulneraiblity is currently avaialbe.", "title": "No Notes" } ], "release_date": "2018-01-04T16:43:00+00:00", "remediations": [ { "category": "none_available", "details": "No remediation is available at this time." } ], "title": "Modern CPU Process Prediction Information Disclosure Vulnerability" } ] }
wid-sec-w-2023-0103
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Prozessor ist das zentrale Rechenwerk eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in den meisten der aktuellen Prozessoren ausnutzen, um Sicherheitsmechanismen zu umgehen und physikalischen Speicher auszulesen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- MacOS X\n- Windows\n- CISCO Appliance\n- Juniper Appliance\n- F5 Networks\n- BIOS/Firmware\n- Sonstiges\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0103 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2023-0103.json" }, { "category": "self", "summary": "WID-SEC-2023-0103 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0103" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2805-1 vom 2023-07-11", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-July/015468.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2506-1 vom 2023-06-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-June/015199.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1892-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014489.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1803-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014434.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1800-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014435.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1802-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014436.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1801-1 vom 2023-04-10", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014437.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:0634-1 vom 2023-03-07", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-March/013982.html" }, { "category": "external", "summary": "Citrix Security Updates CTX231399 vom 2018-01-03", "url": "https://support.citrix.com/article/CTX231399" }, { "category": "external", "summary": "Windows Security Updates 4072698 vom 2018-01-03", "url": "https://support.microsoft.com/en-za/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution-s" }, { "category": "external", "summary": "Xen Security Advisory XSA-254 vom 2018-01-03", "url": "https://xenbits.xen.org/xsa/advisory-254.html" }, { "category": "external", "summary": "Lenovo Security Advisory: LEN-18282 vom 2018-01-03", "url": "https://support.lenovo.com/de/de/solutions/len-18282" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0017 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0017" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0016 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0016" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0015 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0015" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0014 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0014" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0013 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0013" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0012 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0012" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0011 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0011" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0010 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0010" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0009 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0009" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0008 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0008" }, { "category": "external", "summary": "Redhat Security Advisory RHSA-2018:0007 vom 2018-01-03", "url": "https://access.redhat.com/errata/RHSA-2018:0007" }, { "category": "external", "summary": "SUSE Security Update: SUSE-SU-2018:0009-1 vom 2018-01-03", "url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180009-1/" }, { "category": "external", "summary": "SUSE Security Update: SUSE-SU-2018:0008-1 vom 2018-01-03", "url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180008-1/" }, { "category": "external", "summary": "SUSE Security Update: SUSE-SU-2018:0007-1 vom 2018-01-03", "url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180007-1/" }, { "category": "external", "summary": "SUSE Security Update: SUSE-SU-2018:0006-1 vom 2018-01-03", "url": "https://www.suse.com/de-de/support/update/announcement/2018/suse-su-20180006-1/" }, { "category": "external", "summary": "VMware Security Advisory VMSA-2018-0002", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0002.html" }, { "category": "external", "summary": "Microsoft Security Advisory ADV180002 vom 2018-01-03", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "Meltdown and Spectre Informationsseite der Schwachstelle Stand 2018-01-03", "url": "https://meltdownattack.com/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0018 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0018" }, { "category": "external", "summary": "Intel Security Advisory INTEL-SA-00088 vom 2018-01-04", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "category": "external", "summary": "Citrix Security Advisory CTX231390 vom 2018-01-04", "url": "https://support.citrix.com/article/CTX231390" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0020-1 vom 2018-01-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180020-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0019-1 vom 2018-01-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180019-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0024 vom 2018-01-05", "url": "http://linux.oracle.com/errata/ELSA-2018-0024.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0030 vom 2018-01-05", "url": "http://linux.oracle.com/errata/ELSA-2018-0030.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0023 vom 2018-01-05", "url": "http://linux.oracle.com/errata/ELSA-2018-0023.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0040 vom 2018-01-05", "url": "https://access.redhat.com/errata/RHSA-2018:0040" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0038 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0038" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0037 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0037" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0035 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0035" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0034 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0034" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0032 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0032" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0031 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0031" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0029 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0039 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0039" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0036 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0036" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0030 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0030" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0013 vom 2018-01-04", "url": "http://linux.oracle.com/errata/ELSA-2018-0013.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0007 vom 2018-01-04", "url": "http://linux.oracle.com/errata/ELSA-2018-0007.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0012 vom 2018-01-04", "url": "http://linux.oracle.com/errata/ELSA-2018-0012.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0008 vom 2018-01-04", "url": "http://linux.oracle.com/errata/ELSA-2018-0008.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0010-1 vom 2018-01-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180010-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0012-1 vom 2018-01-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180012-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0011-1 vom 2018-01-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180011-1.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:0012 vom 2018-01-04", "url": "https://lwn.net/Alerts/742921" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:0007 vom 2018-01-04", "url": "https://lwn.net/Alerts/742919" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:0014 vom 2018-01-04", "url": "https://lwn.net/Alerts/742920" }, { "category": "external", "summary": "Meldung 43427 auf der Exploit-DB vom 2018-01-03", "url": "https://www.exploit-db.com/exploits/43427/" }, { "category": "external", "summary": "Mozilla Foundation Security Advisory mfsa2018-01 vom 2018-01-04", "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/" }, { "category": "external", "summary": "Google Chrome-Hilfe Stand 2018-01-05", "url": "https://support.google.com/chrome/answer/7623121" }, { "category": "external", "summary": "Debian Security Advisory DSA-4078-1 vom 2018-01-04", "url": "https://lists.debian.org/debian-security-announce/2018/msg00000.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0004 vom 2018-01-05", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000812.html" }, { "category": "external", "summary": "NetApp Advisory NTAP-20180104-0001 vom 2018-01-07", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "category": "external", "summary": "APPLE Security Advisory HT208397 vom 2018-01-08", "url": "https://support.apple.com/kb/HT208397" }, { "category": "external", "summary": "APPLE Security Advisory HT208403 vom 2018-01-08", "url": "https://support.apple.com/kb/HT208403" }, { "category": "external", "summary": "APPLE Security Advisory HT208401 vom 2018-01-08", "url": "https://support.apple.com/kb/HT208401" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0040-1 vom 2018-01-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180040-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0041-1 vom 2018-01-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180041-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0039-1 vom 2018-01-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180039-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0036-1 vom 2018-01-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180036-1.html" }, { "category": "external", "summary": "CISCO Security Advisory CISCO-SA-20180104-CPUSIDECHANNE vom 2018-01-08", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "category": "external", "summary": "F5 Article K91229003 vom 2018-01-06", "url": "https://support.f5.com/csp/article/K91229003" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4006 vom 2018-01-09", "url": "http://linux.oracle.com/errata/ELSA-2018-4006.html" }, { "category": "external", "summary": "VMware Security Advisory VMSA-2018-0004 vom 2018-01-09", "url": "http://www.vmware.com/security/advisories/VMSA-2018-0004.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3521-1 vom 2018-01-09", "url": "http://www.ubuntu.com/usn/usn-3521-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0056-1 vom 2018-01-10", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180056-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4082 vom 2018-01-10", "url": "https://www.debian.org/security/2018/dsa-4082" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0051-1 vom 2018-01-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180051-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3524-2 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3524-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3523-1 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3523-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3522-1 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3522-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3522-2 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3522-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0028 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0028" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0027 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0027" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0026 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0026" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0025 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0025" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0024 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0024" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0023 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0023" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0022 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0022" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0021 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0021" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0020 vom 2018-01-04", "url": "https://access.redhat.com/errata/RHSA-2018:0020" }, { "category": "external", "summary": "CentOS-announce CESA-2018:0013 vom 2018-01-04", "url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022700.html" }, { "category": "external", "summary": "CentOS-announce CESA-RHSA-2018:0024 vom 2018-01-04", "url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022702.html" }, { "category": "external", "summary": "CentOS-announce CESA-2018:0030 vom 2018-01-04", "url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022703.html" }, { "category": "external", "summary": "CentOS-announce CESA-2018:0029 vom 2018-01-04", "url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022704.html" }, { "category": "external", "summary": "CentOS-announce CESA-2018:0023 vom 2018-01-04", "url": "https://lists.centos.org/pipermail/centos-announce/2018-January/022705.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0005 vom 2018-01-09", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000817.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0006 vom 2018-01-09", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000816.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3522-4 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3522-4/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3523-2 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3523-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3525-1 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3525-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3522-3 vom 2018-01-10", "url": "http://www.ubuntu.com/usn/usn-3522-3/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3531-1 vom 2018-01-11", "url": "http://www.ubuntu.com/usn/usn-3531-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3530-1 vom 2018-01-11", "url": "http://www.ubuntu.com/usn/usn-3530-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0068-1 vom 2018-01-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180068-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0067-1 vom 2018-01-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180067-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0069-1 vom 2018-01-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180069-1.html" }, { "category": "external", "summary": "Update des Lenovo Security Advisory: LEN-18282 vom 2018-01-11", "url": "https://support.lenovo.com/de/de/solutions/len-18282" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0007 vom 2018-01-11", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000818.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0008 vom 2018-01-11", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-January/000819.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4011 vom 2018-01-13", "url": "http://linux.oracle.com/errata/ELSA-2018-4011.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0091 vom 2018-01-16", "url": "https://access.redhat.com/errata/RHSA-2018:0091" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0090 vom 2018-01-16", "url": "https://access.redhat.com/errata/RHSA-2018:0090" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0089 vom 2018-01-16", "url": "https://access.redhat.com/errata/RHSA-2018:0089" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0115-1 vom 2018-01-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180115-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0114-1 vom 2018-01-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180114-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0113-1 vom 2018-01-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180113-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0092 vom 2018-01-17", "url": "https://access.redhat.com/errata/RHSA-2018:0092" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0094 vom 2018-01-17", "url": "https://access.redhat.com/errata/RHSA-2018:0094" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0093 vom 2018-01-17", "url": "https://access.redhat.com/errata/RHSA-2018:0093" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0093 vom 2018-01-18", "url": "http://linux.oracle.com/errata/ELSA-2018-0093.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0131-1 vom 2018-01-19", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180131-1/" }, { "category": "external", "summary": "Cisco Seurity Advisory: cisco-sa-20180104-cpusidechannel", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "category": "external", "summary": "HPE SECURITY BULLETIN Document ID: hpesbhf03805en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4012 vom 2018-01-19", "url": "http://linux.oracle.com/errata/ELSA-2018-4012.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4019 vom 2018-01-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4019.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4018 vom 2018-01-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4018.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0112 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0112" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0111 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0111" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0110 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0110" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0109 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0109" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0107 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0107" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0106 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0106" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0105 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0105" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0104 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0104" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0108 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0108" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0103 vom 2018-01-22", "url": "https://access.redhat.com/errata/RHSA-2018:0103" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0171-1 vom 2018-01-22", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180171-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3541-1 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3541-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3531-2 vom 2018-01-22", "url": "http://www.ubuntu.com/usn/usn-3531-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3542-2 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3542-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3541-2 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3541-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3542-1 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3542-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3540-2 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3540-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3540-1 vom 2018-01-23", "url": "http://www.ubuntu.com/usn/usn-3540-1/" }, { "category": "external", "summary": "HP Bulletin Document ID: a00039267en_us", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00039267en_us" }, { "category": "external", "summary": "VMware Knowledge Base article 52245", "url": "https://kb.vmware.com/s/article/52345" }, { "category": "external", "summary": "Microsoft Security Advisory ADV180002", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "Eintrag im Intel Blog", "url": "https://newsroom.intel.com/news/root-cause-of-reboot-issue-identified-updated-guidance-for-customers-and-partners/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0180-1 vom 2018-01-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180180-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0179-1 vom 2018-01-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180179-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4020 vom 2018-01-24", "url": "http://linux.oracle.com/errata/ELSA-2018-4020.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0191-1 vom 2018-01-24", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180191-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0182 vom 2018-01-25", "url": "https://access.redhat.com/errata/RHSA-2018:0182" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0151 vom 2018-01-25", "url": "https://access.redhat.com/errata/RHSA-2018:0151" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0213-1 vom 2018-01-25", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180213-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0151 vom 2018-01-26", "url": "http://linux.oracle.com/errata/ELSA-2018-0151.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0169 vom 2018-01-26", "url": "http://linux.oracle.com/errata/ELSA-2018-0169.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4021 vom 2018-01-28", "url": "http://linux.oracle.com/errata/ELSA-2018-4021.html" }, { "category": "external", "summary": "Informationen von Microsoft vom 2018-01-27", "url": "https://support.microsoft.com/en-us/help/4078130/update-to-disable-mitigation-against-spectre-variant-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3549-1 vom 2018-01-30", "url": "http://www.ubuntu.com/usn/usn-3549-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0285-1 vom 2018-01-30", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180285-1.html" }, { "category": "external", "summary": "Update des Intel Security Advisory INTEL-SA-00088 vom 2018-01-27", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "category": "external", "summary": "Juniper Security Advisory JSA10842 vom 2018-02-02", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10842\u0026cat=SIRT_1\u0026actp=LIST" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3561-1 vom 2018-02-07", "url": "http://www.ubuntu.com/usn/usn-3561-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3560-1 vom 2018-02-07", "url": "http://www.ubuntu.com/usn/usn-3560-1/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4025 vom 2018-02-07", "url": "http://linux.oracle.com/errata/ELSA-2018-4025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0383-1 vom 2018-02-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180383-1.html" }, { "category": "external", "summary": "Update des Intel Security Advisory INTEL-SA-00088 vom 2018-02-07", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0017 vom 2018-02-08", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-February/000828.html" }, { "category": "external", "summary": "Meldung von Intel vom 2018-02-08", "url": "https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0292 vom 2018-02-09", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0416-1 vom 2018-02-10", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180416-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0292 vom 2018-02-12", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0438-1 vom 2018-02-14", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180438-1.html" }, { "category": "external", "summary": "Update des Security Advisory ADV180002 vom 2018-02-13", "url": "https://portal.msrc.microsoft.com/de-de/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0472-1 vom 2018-02-19", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180472-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0482-1 vom 2018-02-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180482-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3580-1 vom 2018-02-22", "url": "http://www.ubuntu.com/usn/usn-3580-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3582-1 vom 2018-02-22", "url": "http://www.ubuntu.com/usn/usn-3582-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3581-1 vom 2018-02-22", "url": "http://www.ubuntu.com/usn/usn-3581-2/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0525-1 vom 2018-02-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180525-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4120 vom 2018-02-23", "url": "https://www.debian.org/security/2018/dsa-4120" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-0292 vom 2018-02-23", "url": "http://linux.oracle.com/errata/ELSA-2018-0292.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0552-1 vom 2018-02-27", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0555-1 vom 2018-02-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180555-1.html" }, { "category": "external", "summary": "Microsoft Advisory ADV180002", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0601-1 vom 2018-03-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180601-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0609-1 vom 2018-03-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180609-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0464 vom 2018-03-07", "url": "https://access.redhat.com/errata/RHSA-2018:0464" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0552-2 vom 2018-03-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180552-2.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0638-1 vom 2018-03-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180638-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0660-1 vom 2018-03-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180660-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0496 vom 2018-03-13", "url": "https://access.redhat.com/errata/RHSA-2018:0496" }, { "category": "external", "summary": "FreeBSD Security Advisory FREEBSD-SA-18:03.SPECULATIV vom 2018-03-14", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0512 vom 2018-03-14", "url": "https://access.redhat.com/errata/RHSA-2018:0512" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:0502 vom 2018-03-14", "url": "https://access.redhat.com/errata/RHSA-2018:0502" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0678-1 vom 2018-03-15", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180678-1.html" }, { "category": "external", "summary": "CentOS Security Advisory CESA-2018:0512 vom 2018-03-14", "url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2018-0512-Important-CentOS-6-kernel-Security-Update-tp4645009.html" }, { "category": "external", "summary": "libvirt Security Notice LSN-2018-0001 vom 2018-03-15", "url": "http://security.libvirt.org/2018/0001.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0705-1 vom 2018-03-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180705-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0708-1 vom 2018-03-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180708-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0831-1 vom 2018-03-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180831-1/" }, { "category": "external", "summary": "EMC Security Advisory DSA-2018-062 vom 2018-03-26", "url": "https://support.emc.com/kb/519589" }, { "category": "external", "summary": "Microsoft KB Artikel KB409166", "url": "https://support.microsoft.com/en-us/help/4091664/kb4091664-intel-microcode-updates" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0757-1 vom 2018-03-22", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180757-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0841-1 vom 2018-03-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180841-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0838-1 vom 2018-03-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180838-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0861-1 vom 2018-04-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180861-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3620-2 vom 2018-04-05", "url": "https://usn.ubuntu.com/3620-2/" }, { "category": "external", "summary": "GENTOO Security Advisory GLSA201804-08 vom 2018-04-09", "url": "https://security.gentoo.org/glsa/201804-08" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0909-1 vom 2018-04-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180909-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0920-1 vom 2018-04-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180920-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1129 vom 2018-04-17", "url": "https://access.redhat.com/errata/RHSA-2018:1129" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1196 vom 2018-04-24", "url": "https://access.redhat.com/errata/RHSA-2018:1196" }, { "category": "external", "summary": "Microsoft Security Advisory ADV180002 Update vom 24.04.2018", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "RedHat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2018:1252" }, { "category": "external", "summary": "Microsoft Knowledgebase Artikel KB4090007", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088\u0026languageid=en-fr" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02", "url": "http://linux.oracle.com/errata/ELSA-2018-4089.html" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html#AppendixSUNS" }, { "category": "external", "summary": "VMware Security Advisories", "url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html" }, { "category": "external", "summary": "Citrix Security Advisory CTX234679 vom 2018-05-09", "url": "https://support.citrix.com/article/CTX234679" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1346 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1346" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1349 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1349" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1350 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1350" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1351 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1351" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1318" }, { "category": "external", "summary": "CISCO Security Advisory CISCO-SA-20180104-CPUSIDECHANNEL vom 2018-05-15", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel?vs_f=Cisco%20Security%20Advisory\u0026vs_cat=Security%20Intelligence\u0026vs_type=RSS\u0026vs_p=CPU%20Side-Channel%20Information%20Disclosure%20Vulnerabilities\u0026vs_k=1" }, { "category": "external", "summary": "F5 Security Advisory K91229003", "url": "https://support.f5.com/csp/article/K91229003" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1967 vom 2018-06-27", "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "category": "external", "summary": "Microsoft Security Advisory ADV180002 vom 2018-08-01", "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180002" }, { "category": "external", "summary": "XEN Security Advisory XSA-289 vom 2019-01-21", "url": "http://seclists.org/oss-sec/2019/q1/76" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0765-1 vom 2019-03-27", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190765-1.html" }, { "category": "external", "summary": "Cumulus Networks Securitty Announcement", "url": "https://support.cumulusnetworks.com/hc/en-us/articles/360020503354-Spectre-and-Meltdown-Vulnerability-Fixes-" }, { "category": "external", "summary": "Cumulus Networks Securitty Announcement", "url": "https://support.cumulusnetworks.com/hc/en-us/articles/115015951667-Meltdown-and-Spectre-Modern-CPU-Vulnerabilities" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1046 vom 2019-05-08", "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:1550-1 vom 2019-06-19", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191550-1.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4469 vom 2019-06-23", "url": "https://www.debian.org/security/2019/dsa-4469" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4710 vom 2019-07-11", "url": "http://linux.oracle.com/errata/ELSA-2019-4710.html" }, { "category": "external", "summary": "ORACLE OVMSA-2019-0035 vom 2019-07-11", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-July/000953.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4702 vom 2019-08-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4702.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4732 vom 2019-08-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4732.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html" }, { "category": "external", "summary": "Debian Security Advisory DLA 2148 vom 2020-04-01", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html" }, { "category": "external", "summary": "ORACLE OVMSA-2020-0026 vom 2020-06-22", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2020-June/000986.html" }, { "category": "external", "summary": "Huawei Security Advisory HUAWEI-SA-20180106-01-CPU vom 2020-08-12", "url": "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180106-01-cpu-en" }, { "category": "external", "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4985-1 vom 2021-06-09", "url": "https://ubuntu.com/security/notices/USN-4985-1" }, { "category": "external", "summary": "Debian Security Advisory DLA-2743 vom 2021-08-16", "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:3929-1 vom 2021-12-06", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009844.html" }, { "category": "external", "summary": "Lenovo Security Advisory", "url": "https://support.lenovo.com/de/de/product_security/ps500479-amd-and-intel-processor-advisory" }, { "category": "external", "summary": "AMD Security Bulletin", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0187 vom 2023-01-17", "url": "https://access.redhat.com/errata/RHSA-2023:0187" } ], "source_lang": "en-US", "title": "Meltdown und Spectre: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-07-10T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:41:31.466+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0103", "initial_release_date": "2018-01-03T23:00:00.000+00:00", "revision_history": [ { "date": "2018-01-03T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-01-03T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-01-03T23:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2018-01-03T23:00:00.000+00:00", "number": "4", "summary": "Version nicht vorhanden" }, { "date": "2018-01-03T23:00:00.000+00:00", "number": "5", "summary": "Version nicht vorhanden" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "7", "summary": "Version nicht vorhanden" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "8", "summary": "Version nicht vorhanden" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "10", "summary": "Version nicht vorhanden" }, { "date": "2018-01-04T23:00:00.000+00:00", "number": "11", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "14", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "15", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "16", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "17", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "18", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "20", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "21", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "22", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "23", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "24", "summary": "Version nicht vorhanden" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "26", "summary": "Version nicht vorhanden" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "29", "summary": "Version nicht vorhanden" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "30", "summary": "Version nicht vorhanden" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "31", "summary": "Adjust probable damage to 4" }, { "date": "2018-01-08T23:00:00.000+00:00", "number": "32", "summary": "Version nicht vorhanden" }, { "date": "2018-01-09T23:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2018-01-09T23:00:00.000+00:00", "number": "34", "summary": "Version nicht vorhanden" }, { "date": "2018-01-09T23:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "36", "summary": "New remediations available" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "37", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "38", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "39", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "40", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "41", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "42", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "43", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "44", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "45", "summary": "Version nicht vorhanden" }, { "date": "2018-01-10T23:00:00.000+00:00", "number": "46", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "47", "summary": "reference added" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "48", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "50", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "51", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "52", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "53", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "54", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "55", "summary": "Version nicht vorhanden" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "56", "summary": "Version nicht vorhanden" }, { "date": "2018-01-14T23:00:00.000+00:00", "number": "57", "summary": "New remediations available" }, { "date": "2018-01-15T23:00:00.000+00:00", "number": "58", "summary": "New remediations available" }, { "date": "2018-01-16T23:00:00.000+00:00", "number": "59", "summary": "New remediations available" }, { "date": "2018-01-17T23:00:00.000+00:00", "number": "60", "summary": "New remediations available" }, { "date": "2018-01-18T23:00:00.000+00:00", "number": "61", "summary": "New remediations available" }, { "date": "2018-01-18T23:00:00.000+00:00", "number": "62", "summary": "New remediations available" }, { "date": "2018-01-18T23:00:00.000+00:00", "number": "63", "summary": "New remediations available" }, { "date": "2018-01-18T23:00:00.000+00:00", "number": "64", "summary": "Version nicht vorhanden" }, { "date": "2018-01-21T23:00:00.000+00:00", "number": "65", "summary": "New remediations available" }, { "date": "2018-01-22T23:00:00.000+00:00", "number": "66", "summary": "New remediations available" }, { "date": "2018-01-22T23:00:00.000+00:00", "number": "67", "summary": "New remediations available" }, { "date": "2018-01-22T23:00:00.000+00:00", "number": "68", "summary": "New remediations available" }, { "date": "2018-01-22T23:00:00.000+00:00", "number": "69", "summary": "New remediations available" }, { "date": "2018-01-22T23:00:00.000+00:00", "number": "70", "summary": "New remediations available" }, { "date": "2018-01-23T23:00:00.000+00:00", "number": "71", "summary": "New remediations available" }, { "date": "2018-01-24T23:00:00.000+00:00", "number": "72", "summary": "New remediations available" }, { "date": "2018-01-25T23:00:00.000+00:00", "number": "73", "summary": "New remediations available" }, { "date": "2018-01-28T23:00:00.000+00:00", "number": "74", "summary": "New remediations available" }, { "date": "2018-01-28T23:00:00.000+00:00", "number": "75", "summary": "Version nicht vorhanden" }, { "date": "2018-01-29T23:00:00.000+00:00", "number": "76", "summary": "New remediations available" }, { "date": "2018-01-30T23:00:00.000+00:00", "number": "77", "summary": "New remediations available" }, { "date": "2018-01-30T23:00:00.000+00:00", "number": "78", "summary": "Version nicht vorhanden" }, { "date": "2018-01-30T23:00:00.000+00:00", "number": "79", "summary": "Version nicht vorhanden" }, { "date": "2018-01-30T23:00:00.000+00:00", "number": "80", "summary": "Version nicht vorhanden" }, { "date": "2018-02-07T23:00:00.000+00:00", "number": "81", "summary": "New remediations available" }, { "date": "2018-02-07T23:00:00.000+00:00", "number": "82", "summary": "Version nicht vorhanden" }, { "date": "2018-02-08T23:00:00.000+00:00", "number": "83", "summary": "New remediations available" }, { "date": "2018-02-08T23:00:00.000+00:00", "number": "84", "summary": "Version nicht vorhanden" }, { "date": "2018-02-11T23:00:00.000+00:00", "number": "85", "summary": "New remediations available" }, { "date": "2018-02-14T23:00:00.000+00:00", "number": "86", "summary": "New remediations available" }, { "date": "2018-02-14T23:00:00.000+00:00", "number": "87", "summary": "Version nicht vorhanden" }, { "date": "2018-02-19T23:00:00.000+00:00", "number": "88", "summary": "New remediations available" }, { "date": "2018-02-21T23:00:00.000+00:00", "number": "89", "summary": "New remediations available" }, { "date": "2018-02-22T23:00:00.000+00:00", "number": "90", "summary": "New remediations available" }, { "date": "2018-02-25T23:00:00.000+00:00", "number": "91", "summary": "New remediations available" }, { "date": "2018-02-27T23:00:00.000+00:00", "number": "92", "summary": "New remediations available" }, { "date": "2018-03-01T23:00:00.000+00:00", "number": "93", "summary": "New remediations available" }, { "date": "2018-03-05T23:00:00.000+00:00", "number": "94", "summary": "New remediations available" }, { "date": "2018-03-07T23:00:00.000+00:00", "number": "95", "summary": "New remediations available" }, { "date": "2018-03-08T23:00:00.000+00:00", "number": "96", "summary": "New remediations available" }, { "date": "2018-03-12T23:00:00.000+00:00", "number": "97", "summary": "New remediations available" }, { "date": "2018-03-13T23:00:00.000+00:00", "number": "98", "summary": "New remediations available" }, { "date": "2018-03-13T23:00:00.000+00:00", "number": "99", "summary": "New remediations available" }, { "date": "2018-03-14T23:00:00.000+00:00", "number": "100", "summary": "New remediations available" }, { "date": "2018-03-14T23:00:00.000+00:00", "number": "101", "summary": "New remediations available" }, { "date": "2018-03-15T23:00:00.000+00:00", "number": "102", "summary": "New remediations available" }, { "date": "2018-03-15T23:00:00.000+00:00", "number": "103", "summary": "New remediations available" }, { "date": "2018-03-18T23:00:00.000+00:00", "number": "104", "summary": "New remediations available" }, { "date": "2018-03-18T23:00:00.000+00:00", "number": "105", "summary": "Version nicht vorhanden" }, { "date": "2018-03-18T23:00:00.000+00:00", "number": "106", "summary": "Version nicht vorhanden" }, { "date": "2018-03-21T23:00:00.000+00:00", "number": "107", "summary": "New remediations available" }, { "date": "2018-03-21T23:00:00.000+00:00", "number": "108", "summary": "Version nicht vorhanden" }, { "date": "2018-03-27T22:00:00.000+00:00", "number": "109", "summary": "New remediations available" }, { "date": "2018-03-27T22:00:00.000+00:00", "number": "110", "summary": "Version nicht vorhanden" }, { "date": "2018-04-02T22:00:00.000+00:00", "number": "111", "summary": "New remediations available" }, { "date": "2018-04-03T22:00:00.000+00:00", "number": "112", "summary": "New remediations available" }, { "date": "2018-04-04T22:00:00.000+00:00", "number": "113", "summary": "New remediations available" }, { "date": "2018-04-08T22:00:00.000+00:00", "number": "114", "summary": "New remediations available" }, { "date": "2018-04-10T22:00:00.000+00:00", "number": "115", "summary": "New remediations available" }, { "date": "2018-04-10T22:00:00.000+00:00", "number": "116", "summary": "Version nicht vorhanden" }, { "date": "2018-04-10T22:00:00.000+00:00", "number": "117", "summary": "Version nicht vorhanden" }, { "date": "2018-04-12T22:00:00.000+00:00", "number": "118", "summary": "New remediations available" }, { "date": "2018-04-17T22:00:00.000+00:00", "number": "119", "summary": "New remediations available" }, { "date": "2018-04-17T22:00:00.000+00:00", "number": "120", "summary": "Version nicht vorhanden" }, { "date": "2018-04-23T22:00:00.000+00:00", "number": "121", "summary": "New remediations available" }, { "date": "2018-04-24T22:00:00.000+00:00", "number": "122", "summary": "New remediations available" }, { "date": "2018-04-25T22:00:00.000+00:00", "number": "123", "summary": "Added references" }, { "date": "2018-04-26T22:00:00.000+00:00", "number": "124", "summary": "New remediations available" }, { "date": "2018-05-02T22:00:00.000+00:00", "number": "125", "summary": "New remediations available" }, { "date": "2018-05-03T22:00:00.000+00:00", "number": "126", "summary": "New remediations available" }, { "date": "2018-05-03T22:00:00.000+00:00", "number": "127", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "128", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "129", "summary": "Version nicht vorhanden" }, { "date": "2018-05-15T22:00:00.000+00:00", "number": "130", "summary": "New remediations available" }, { "date": "2018-05-21T22:00:00.000+00:00", "number": "131", "summary": "New remediations available" }, { "date": "2018-06-04T22:00:00.000+00:00", "number": "132", "summary": "New Information F5" }, { "date": "2018-06-10T22:00:00.000+00:00", "number": "133", "summary": "Added references" }, { "date": "2018-06-27T22:00:00.000+00:00", "number": "134", "summary": "Added references" }, { "date": "2018-08-05T22:00:00.000+00:00", "number": "135", "summary": "Added references" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "136", "summary": "Added references" }, { "date": "2019-03-26T23:00:00.000+00:00", "number": "137", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-04-03T22:00:00.000+00:00", "number": "138", "summary": "Neue Updates aufgenommen" }, { "date": "2019-04-03T22:00:00.000+00:00", "number": "139", "summary": "Neue Updates aufgenommen" }, { "date": "2019-05-08T22:00:00.000+00:00", "number": "140", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-06T22:00:00.000+00:00", "number": "141", "summary": "Referenz(en) aufgenommen: ELSA-2019-4668" }, { "date": "2019-06-18T22:00:00.000+00:00", "number": "142", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-06-23T22:00:00.000+00:00", "number": "143", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2019-07-10T22:00:00.000+00:00", "number": "144", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-07-11T22:00:00.000+00:00", "number": "145", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2019-08-04T22:00:00.000+00:00", "number": "146", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "147", "summary": "Schreibfehler korrigiert" }, { "date": "2019-09-24T22:00:00.000+00:00", "number": "148", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "149", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-22T22:00:00.000+00:00", "number": "150", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2020-08-11T22:00:00.000+00:00", "number": "151", "summary": "Neue Updates von Huawei aufgenommen" }, { "date": "2020-08-12T22:00:00.000+00:00", "number": "152", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-06-08T22:00:00.000+00:00", "number": "153", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2021-08-15T22:00:00.000+00:00", "number": "154", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "155", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-12-06T23:00:00.000+00:00", "number": "156", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-03-08T23:00:00.000+00:00", "number": "157", "summary": "Neue Updates von LENOVO und AMD aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "158", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-01-17T23:00:00.000+00:00", "number": "159", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-01-18T23:00:00.000+00:00", "number": "160", "summary": "doppelte Cisco Referenz bereinigt" }, { "date": "2023-01-19T23:00:00.000+00:00", "number": "161", "summary": "Schreibfehler korrigiert" }, { "date": "2023-03-07T23:00:00.000+00:00", "number": "162", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-10T22:00:00.000+00:00", "number": "163", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "164", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "165", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "166", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-06-13T22:00:00.000+00:00", "number": "167", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-07-10T22:00:00.000+00:00", "number": "168", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "168" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple Mac OS X", "product": { "name": "Apple Mac OS X", "product_id": "699", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os_x:-" } } }, { "category": "product_name", "name": "Apple Safari", "product": { "name": "Apple Safari", "product_id": "717", "product_identification_helper": { "cpe": "cpe:/a:apple:safari:-" } } }, { "category": "product_name", "name": "Apple iOS", "product": { "name": "Apple iOS", "product_id": "T005205", "product_identification_helper": { "cpe": "cpe:/o:apple:iphone_os:-" } } } ], "category": "vendor", "name": "Apple" }, { "branches": [ { "category": "product_name", "name": "Cisco Nexus", "product": { "name": "Cisco Nexus", "product_id": "T004033", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:-" } } }, { "category": "product_name", "name": "Cisco Router", "product": { "name": "Cisco Router", "product_id": "T003258", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:-" } } }, { "category": "product_name", "name": "Cisco Unified Computing System (UCS)", "product": { "name": "Cisco Unified Computing System (UCS)", "product_id": "163824", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:-" } } }, { "category": "product_name", "name": "Cisco Wide Area Application Services", "product": { "name": "Cisco Wide Area Application Services", "product_id": "2186", "product_identification_helper": { "cpe": "cpe:/a:cisco:wide_area_application_services:-" } } } ], "category": "vendor", "name": "Cisco" }, { "branches": [ { "category": "product_name", "name": "Citrix Systems NetScaler", "product": { "name": "Citrix Systems NetScaler", "product_id": "70427", "product_identification_helper": { "cpe": "cpe:/a:citrix:netscaler:-" } } }, { "category": "product_name", "name": "Citrix Systems Xen App", "product": { "name": "Citrix Systems Xen App", "product_id": "T004075", "product_identification_helper": { "cpe": "cpe:/a:citrix:xenapp:-" } } }, { "category": "product_name", "name": "Citrix Systems Xen Desktop", "product": { "name": "Citrix Systems Xen Desktop", "product_id": "T004076", "product_identification_helper": { "cpe": "cpe:/a:citrix:xen_desktop:-" } } }, { "category": "product_name", "name": "Citrix Systems XenServer", "product": { "name": "Citrix Systems XenServer", "product_id": "T004077", "product_identification_helper": { "cpe": "cpe:/a:citrix:xenserver:-" } } } ], "category": "vendor", "name": "Citrix Systems" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "EMC Data Domain OS", "product": { "name": "EMC Data Domain OS", "product_id": "T006099", "product_identification_helper": { "cpe": "cpe:/o:emc:data_domain_os:-" } } } ], "category": "vendor", "name": "EMC" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "F5 BIG-IP 13.0.0", "product": { "name": "F5 BIG-IP 13.0.0", "product_id": "T009498", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:13.0.0" } } }, { "category": "product_name", "name": "F5 BIG-IP 13.1.0", "product": { "name": "F5 BIG-IP 13.1.0", "product_id": "T011463", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:13.1.0" } } }, { "category": "product_name", "name": "F5 BIG-IP 12.1.0 - 12.1.3", "product": { "name": "F5 BIG-IP 12.1.0 - 12.1.3", "product_id": "T011954", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:12.1.0_-_12.1.3" } } }, { "category": "product_name", "name": "F5 BIG-IP 11.5.1 - 11.5.5", "product": { "name": "F5 BIG-IP 11.5.1 - 11.5.5", "product_id": "T011955", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:11.5.1_-_11.5.5" } } }, { "category": "product_name", "name": "F5 BIG-IP 11.2.1", "product": { "name": "F5 BIG-IP 11.2.1", "product_id": "T011962", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:11.2.1_-_11.6.3" } } }, { "category": "product_name", "name": "F5 BIG-IP 11.6.1 - 11.6.2", "product": { "name": "F5 BIG-IP 11.6.1 - 11.6.2", "product_id": "T011964", "product_identification_helper": { "cpe": "cpe:/a:f5:big-ip:11.6.1_-_11.6.2" } } } ], "category": "product_name", "name": "BIG-IP" }, { "category": "product_name", "name": "F5 Enterprise Manager 3.1.1", "product": { "name": "F5 Enterprise Manager 3.1.1", "product_id": "T011961", "product_identification_helper": { "cpe": "cpe:/a:f5:enterprise_manager:3.1.1" } } } ], "category": "vendor", "name": "F5" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Huawei OceanStor", "product": { "name": "Huawei OceanStor", "product_id": "T017101", "product_identification_helper": { "cpe": "cpe:/h:huawei:oceanstor_uds:-" } } } ], "category": "vendor", "name": "Huawei" }, { "branches": [ { "category": "product_name", "name": "Intel Prozessor", "product": { "name": "Intel Prozessor", "product_id": "T011586", "product_identification_helper": { "cpe": "cpe:/h:intel:intel_prozessor:-" } } }, { "category": "product_name", "name": "Intel Xeon", "product": { "name": "Intel Xeon", "product_id": "T011286", "product_identification_helper": { "cpe": "cpe:/h:intel:xeon:-" } } } ], "category": "vendor", "name": "Intel" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } }, { "category": "product_name", "name": "Juniper Junos Space", "product": { "name": "Juniper Junos Space", "product_id": "T003343", "product_identification_helper": { "cpe": "cpe:/a:juniper:junos_space:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "Microsoft Edge", "product": { "name": "Microsoft Edge", "product_id": "T005922", "product_identification_helper": { "cpe": "cpe:/a:microsoft:edge:-" } } }, { "category": "product_name", "name": "Microsoft Internet Explorer 11", "product": { "name": "Microsoft Internet Explorer 11", "product_id": "T003302", "product_identification_helper": { "cpe": "cpe:/a:microsoft:internet_explorer:11" } } }, { "category": "product_name", "name": "Microsoft SQL Server (MSSQL) 2017 x64", "product": { "name": "Microsoft SQL Server (MSSQL) 2017 x64", "product_id": "T011516", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sql_server:2017::x64" } } }, { "branches": [ { "category": "product_name", "name": "Microsoft SQL Server 2016 SP1 x64", "product": { "name": "Microsoft SQL Server 2016 SP1 x64", "product_id": "T011514", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sql_server_2016:sp1" } } }, { "category": "product_name", "name": "Microsoft SQL Server 2016 SP1 (CU) x64", "product": { "name": "Microsoft SQL Server 2016 SP1 (CU) x64", "product_id": "T011515", "product_identification_helper": { "cpe": "cpe:/a:microsoft:sql_server_2016:sp1:cu:x64" } } } ], "category": "product_name", "name": "SQL Server 2016" }, { "category": "product_name", "name": "Microsoft Windows All versions", "product": { "name": "Microsoft Windows All versions", "product_id": "7107", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2008", "product": { "name": "Microsoft Windows Server 2008", "product_id": "103824", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2008:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2012 R2", "product": { "name": "Microsoft Windows Server 2012 R2", "product_id": "185379", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2012:-" } } }, { "category": "product_name", "name": "Microsoft Windows Server 2016", "product": { "name": "Microsoft Windows Server 2016", "product_id": "T008880", "product_identification_helper": { "cpe": "cpe:/o:microsoft:windows_server_2016:-" } } } ], "category": "vendor", "name": "Microsoft" }, { "branches": [ { "category": "product_name", "name": "Mozilla Firefox \u003c 57.0.4", "product": { "name": "Mozilla Firefox \u003c 57.0.4", "product_id": "T011585", "product_identification_helper": { "cpe": "cpe:/a:mozilla:firefox:57.0.4" } } } ], "category": "vendor", "name": "Mozilla" }, { "branches": [ { "category": "product_name", "name": "NetApp FAS", "product": { "name": "NetApp FAS", "product_id": "T011540", "product_identification_helper": { "cpe": "cpe:/h:netapp:fas:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "category": "product_name", "name": "Open Source CentOS", "product": { "name": "Open Source CentOS", "product_id": "1727", "product_identification_helper": { "cpe": "cpe:/o:centos:centos:-" } } }, { "category": "product_name", "name": "Open Source QEMU", "product": { "name": "Open Source QEMU", "product_id": "T007150", "product_identification_helper": { "cpe": "cpe:/a:qemu:qemu:-" } } }, { "category": "product_name", "name": "Open Source Xen", "product": { "name": "Open Source Xen", "product_id": "T000611", "product_identification_helper": { "cpe": "cpe:/o:xen:xen:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux 6", "product": { "name": "Red Hat Enterprise Linux 6", "product_id": "120737", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7", "product": { "name": "Red Hat Enterprise Linux 7", "product_id": "T007579", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 6.6 AUS", "product": { "name": "Red Hat Enterprise Linux 6.6 AUS", "product_id": "T008764", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6.6:advanced_update_support" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7.3", "product": { "name": "Red Hat Enterprise Linux 7.3", "product_id": "T008930", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7.3 EUS", "product": { "name": "Red Hat Enterprise Linux 7.3 EUS", "product_id": "T010722", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3_eus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7 RT", "product": { "name": "Red Hat Enterprise Linux 7 RT", "product_id": "T011506", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::real_time" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server EUS 7.3 x86_64 EUS", "product": { "name": "Red Hat Enterprise Linux Server EUS 7.3 x86_64 EUS", "product_id": "T011507", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:eus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server AUS 7.3 x86_64 AUS", "product": { "name": "Red Hat Enterprise Linux Server AUS 7.3 x86_64 AUS", "product_id": "T011508", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:aus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server 7.3 x86_64 TUS", "product": { "name": "Red Hat Enterprise Linux Server 7.3 x86_64 TUS", "product_id": "T011509", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:tus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server 7.3 x86_64 4 year extended Update Support", "product": { "name": "Red Hat Enterprise Linux Server 7.3 x86_64 4 year extended Update Support", "product_id": "T011510", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.3:x86_64:4_year_extended_update_support" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 6.7 EUS", "product": { "name": "Red Hat Enterprise Linux 6.7 EUS", "product_id": "T011511", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6.7::eus" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux 7.2 AUS", "product": { "name": "Red Hat Enterprise Linux 7.2 AUS", "product_id": "T011513", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7.2::aus" } } } ], "category": "product_name", "name": "Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "VMware ESXi 5.5", "product": { "name": "VMware ESXi 5.5", "product_id": "228240", "product_identification_helper": { "cpe": "cpe:/o:vmware:esxi:5.5" } } }, { "category": "product_name", "name": "VMware ESXi 6.0", "product": { "name": "VMware ESXi 6.0", "product_id": "328679", "product_identification_helper": { "cpe": "cpe:/o:vmware:esxi:6.0" } } }, { "category": "product_name", "name": "VMware ESXi 6.5", "product": { "name": "VMware ESXi 6.5", "product_id": "T010749", "product_identification_helper": { "cpe": "cpe:/o:vmware:esxi:6.5" } } } ], "category": "product_name", "name": "ESXi" }, { "category": "product_name", "name": "VMware Fusion (for MAC) \u003c 8.5.9", "product": { "name": "VMware Fusion (for MAC) \u003c 8.5.9", "product_id": "T011502", "product_identification_helper": { "cpe": "cpe:/a:vmware:fusion:8.5.9" } } }, { "category": "product_name", "name": "VMware Workstation \u003c 12.5.9", "product": { "name": "VMware Workstation \u003c 12.5.9", "product_id": "T011562", "product_identification_helper": { "cpe": "cpe:/a:vmware:workstation:12.5.9" } } } ], "category": "vendor", "name": "VMware" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5715", "notes": [ { "category": "description", "text": "In den Prozessoren verschiedener Hersteller existieren mehrere Schwachstellen. Ein anonymer, entfernter Angreifer kann diese, unter dem Namen \"Spectre\" bekannten Schwachstellen nutzen, um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen umgehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, ein modifiziertes Programm zur Ausf\u00fchrung zu bringen." } ], "product_status": { "known_affected": [ "T004033", "T004077", "T003343", "T011962", "T011961", "T003302", "T011964", "T005205", "T005922", "T011286", "T004914", "5930", "228240", "T010749", "717", "70427", "T004075", "T004076", "T006099", "T006520", "T011119", "T011515", "T011955", "T011514", "T011954", "163824", "T011516", "T011511", "T011510", "T003258", "T007579", "T011513", "2951", "T002207", "120737", "T011508", "T011507", "T009310", "T011509", "T008930", "T011506", "67646", "4035", "T011463", "T011540", "T011586", "T000611", "699", "328679", "103824", "T010722", "T008764", "2186", "185379", "T017101", "T000126", "7107", "T007150", "1727", "T009498", "T008880" ] }, "release_date": "2018-01-03T23:00:00.000+00:00", "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "notes": [ { "category": "description", "text": "In den Prozessoren verschiedener Hersteller existieren mehrere Schwachstellen. Ein anonymer, entfernter Angreifer kann diese, unter dem Namen \"Spectre\" bekannten Schwachstellen nutzen, um Teile des physikalischen Speicher auszulesen und so Sicherheitsmechanismen umgehen. Zur erfolgreichen Ausnutzung dieser Schwachstellen muss der Angreifer den Benutzer dazu bringen, ein modifiziertes Programm zur Ausf\u00fchrung zu bringen." } ], "product_status": { "known_affected": [ "T004033", "T004077", "T003343", "T011962", "T011961", "T003302", "T011964", "T005205", "T005922", "T011286", "T004914", "5930", "228240", "T010749", "717", "70427", "T004075", "T004076", "T006099", "T006520", "T011119", "T011515", "T011955", "T011514", "T011954", "163824", "T011516", "T011511", "T011510", "T003258", "T007579", "T011513", "2951", "T002207", "120737", "T011508", "T011507", "T009310", "T011509", "T008930", "T011506", "67646", "4035", "T011463", "T011540", "T011586", "T000611", "699", "328679", "103824", "T010722", "T008764", "2186", "185379", "T017101", "T000126", "7107", "T007150", "1727", "T009498", "T008880" ] }, "release_date": "2018-01-03T23:00:00.000+00:00", "title": "CVE-2017-5753" }, { "cve": "CVE-2017-5754", "notes": [ { "category": "description", "text": "In den Prozessoren des Herstellers Intel existiert eine Schwachstelle. Ein anonymer, entfernter Angreifer kann diese, als \"Meltdown\" bekannte Schwachstelle nutzen, um den physikalischen Speicher auszulesen und so Sicherheitsmechanismen umgehen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, ein modifiziertes Programm zur Ausf\u00fchrung zu bringen." } ], "product_status": { "known_affected": [ "T004033", "T004077", "T003343", "T011962", "T011961", "T003302", "T011964", "T005205", "T005922", "T011286", "T004914", "5930", "228240", "T010749", "717", "70427", "T004075", "T004076", "T006099", "T006520", "T011119", "T011515", "T011955", "T011514", "T011954", "163824", "T011516", "T011511", "T011510", "T003258", "T007579", "T011513", "2951", "T002207", "120737", "T011508", "T011507", "T009310", "T011509", "T008930", "T011506", "67646", "4035", "T011463", "T011540", "T011586", "T000611", "699", "328679", "103824", "T010722", "T008764", "2186", "185379", "T000126", "7107", "T007150", "1727", "T009498", "T008880" ] }, "release_date": "2018-01-03T23:00:00.000+00:00", "title": "CVE-2017-5754" } ] }
wid-sec-w-2022-0532
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Debian ist eine Linux-Distribution, die ausschlie\u00dflich Freie Software enth\u00e4lt.\r\nOracle Linux ist ein Open Source Betriebssystem, welches unter der GNU General Public License (GPL) verf\u00fcgbar ist.\r\nDer Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen im Linux Kernel ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, einen Denial of Service Angriff durchzuf\u00fchren, Sicherheitsmechanismen zu umgehen, vertrauliche Daten einzusehen oder seine Privilegien zu erweitern.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0532 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2022-0532.json" }, { "category": "self", "summary": "WID-SEC-2022-0532 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0532" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:2232-1 vom 2023-05-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-May/014918.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1992-1 vom 2023-04-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014572.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1897-1 vom 2023-04-18", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014485.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2023:1848-1 vom 2023-04-14", "url": "https://lists.suse.com/pipermail/sle-security-updates/2023-April/014466.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3698-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3698-2" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3697-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3697-1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3696-1 vom 2018-07-03", "url": "http://www.ubuntu.com/usn/usn-3696-2" }, { "category": "external", "summary": "Debian Security Advisory DSA-4187-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "category": "external", "summary": "Debian Security Advisory DSA-4188-1 vom 2018-05-01", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4088 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4088.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4087 vom 2018-05-01", "url": "https://linux.oracle.com/errata/ELSA-2018-4087.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4089 vom 2018-05-02", "url": "http://linux.oracle.com/errata/ELSA-2018-4089.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1173-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181173-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1172-1 vom 2018-05-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181172-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1318 vom 2018-05-09", "url": "http://www.auscert.org.au/bulletins/62478" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1355 vom 2018-05-09", "url": "https://access.redhat.com/errata/RHSA-2018:1355" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1318 vom 2018-05-09", "url": "http://linux.oracle.com/errata/ELSA-2018-1318.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1217-1 vom 2018-05-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181217-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1238-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181238-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1225-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181225-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1240-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181240-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1230-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181230-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1223-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181223-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1228-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181228-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1236-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181236-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1239-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181239-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1231-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181231-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1229-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181229-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1237-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181237-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1232-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181232-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1227-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181227-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1234-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181234-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1233-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181233-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1226-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181226-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1235-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181235-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1222-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181222-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1224-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181224-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1263-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181263-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1221-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181221-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1220-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181220-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1249-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181249-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1246-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181246-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1252-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181252-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1260-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181260-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1270-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181270-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1262-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181262-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1242-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181242-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1268-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181268-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1248-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181248-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1258-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181258-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1272-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181272-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1250-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181250-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1253-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181253-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1241-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181241-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1259-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181259-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1256-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181256-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1245-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181245-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1264-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181264-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1254-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181254-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1266-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181266-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1269-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181269-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1251-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181251-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1255-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181255-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1273-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181273-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1243-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181243-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1244-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181244-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1261-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181261-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1267-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181267-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1247-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181247-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1257-1 vom 2018-05-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181257-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:1374 vom 2018-05-16", "url": "https://access.redhat.com/errata/RHSA-2018:1374" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1309-1 vom 2018-05-17", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181309-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1629 vom 2018-05-22", "url": "http://linux.oracle.com/errata/ELSA-2018-1629.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4114 vom 2018-05-23", "url": "http://linux.oracle.com/errata/ELSA-2018-4114.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1366-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181366-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1375-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181375-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1376-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181376-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1386-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181386-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1368-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181368-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1374-1 vom 2018-05-23", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181374-1.html" }, { "category": "external", "summary": "Oraclevm-errata OVMSA-2018-0223 vom 2018-05-23", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2018-May/000858.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1465-1 vom 2018-05-30", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181465-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1498-1 vom 2018-06-05", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181498-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1508-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181508-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1551-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181551-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1525-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181525-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1536-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181536-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1511-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181511-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1545-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181545-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1522-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181522-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1530-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181530-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1534-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181534-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1524-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181524-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1505-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181505-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1510-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181510-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1516-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181516-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1523-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181523-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1532-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181532-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1531-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181531-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1521-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181521-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1518-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181518-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1506-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181506-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1548-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181548-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1514-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181514-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1541-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181541-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1546-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181546-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1519-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181519-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1509-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181509-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1528-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181528-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1537-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181537-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1513-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181513-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1512-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181512-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1538-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181538-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1517-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181517-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1535-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181535-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1529-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181529-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1549-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181549-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1540-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181540-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1520-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181520-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1526-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181526-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1533-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181533-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1539-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181539-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1543-1 vom 2018-06-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181543-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1571-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181571-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1570-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181570-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1567-1 vom 2018-06-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181567-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1636-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181636-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1644-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181644-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1639-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181639-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1645-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181645-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1641-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181641-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1640-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181640-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1637-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1648-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181648-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1642-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181642-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1643-1 vom 2018-06-11", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181643-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4145 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4145.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4134 vom 2018-06-16", "url": "http://linux.oracle.com/errata/ELSA-2018-4134.html" }, { "category": "external", "summary": "Red Hat Security Advisory", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1762-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181762-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1761-1 vom 2018-06-20", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181761-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1772-1 vom 2018-06-21", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181772-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:1816-1 vom 2018-06-26", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20181816-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-1854 vom 2018-06-26", "url": "http://linux.oracle.com/errata/ELSA-2018-1854.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4161 vom 2018-07-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4161.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4164 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4164.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2162 vom 2018-07-11", "url": "http://linux.oracle.com/errata/ELSA-2018-2162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2082-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182082-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2092-1 vom 2018-07-28", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182092-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2150-1 vom 2018-08-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182150-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2222-1 vom 2018-08-07", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182222-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4193 vom 2018-08-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4193.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2384 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2384.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-2390 vom 2018-08-15", "url": "http://linux.oracle.com/errata/ELSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2390.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-14", "url": "http://rhn.redhat.com/errata/RHSA-2018-2384.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2384 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2384" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2387 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2388 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2388" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2390 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2390" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2389 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2389" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2395 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2395" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2391 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2391" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2392 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2392" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2393 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2393" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2394 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2396 vom 2018-08-15", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2332-1 vom 2018-08-15", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182332-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2366-1 vom 2018-08-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182366-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4200 vom 2018-08-17", "url": "http://linux.oracle.com/errata/ELSA-2018-4200.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2637-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182637-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2631-1 vom 2018-09-06", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182631-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4211 vom 2018-09-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4211.html" }, { "category": "external", "summary": "Debian Security Advisory DSA-4308 vom 2018-10-01", "url": "https://www.debian.org/security/2018/dsa-4308" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3003-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183003-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3004-1 vom 2018-10-04", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183004-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3084-1 vom 2018-10-09", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183084-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4242 vom 2018-10-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4242.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4245 vom 2018-10-11", "url": "http://linux.oracle.com/errata/ELSA-2018-4245.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4250 vom 2018-10-13", "url": "http://linux.oracle.com/errata/ELSA-2018-4250.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2948 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3096 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3096" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:3083 vom 2018-10-31", "url": "https://access.redhat.com/errata/RHSA-2018:3083" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3589-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183589-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3593-1 vom 2018-11-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183593-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-3083 vom 2018-11-06", "url": "http://linux.oracle.com/errata/ELSA-2018-3083.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3659-1 vom 2018-11-08", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183659-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4268 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4268.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4269 vom 2018-11-08", "url": "http://linux.oracle.com/errata/ELSA-2018-4269.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4285 vom 2018-11-21", "url": "http://linux.oracle.com/errata/ELSA-2018-4285.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3934-1 vom 2018-11-29", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:3961-1 vom 2018-12-01", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183961-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4301 vom 2018-12-10", "url": "http://linux.oracle.com/errata/ELSA-2018-4301.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2018-4304 vom 2018-12-12", "url": "http://linux.oracle.com/errata/ELSA-2018-4304.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4069-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:4072-1 vom 2018-12-12", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20184072-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4315 vom 2019-01-03", "url": "http://linux.oracle.com/errata/ELSA-2019-4315.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4316 vom 2019-01-04", "url": "http://linux.oracle.com/errata/ELSA-2019-4316.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4317 vom 2019-01-05", "url": "http://linux.oracle.com/errata/ELSA-2019-4317.html" }, { "category": "external", "summary": "AVAYA Security Advisory ASA-2018-252 vom 2020-01-07", "url": "https://downloads.avaya.com/css/P8/documents/101051981" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:0095-1 vom 2019-01-16", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3880-2 vom 2019-02-05", "url": "https://usn.ubuntu.com/3880-2/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3910-1 vom 2019-03-16", "url": "https://usn.ubuntu.com/3910-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:0641 vom 2019-03-26", "url": "https://access.redhat.com/errata/RHSA-2019:0641" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4596 vom 2019-04-01", "url": "http://linux.oracle.com/errata/ELSA-2019-4596.html" }, { "category": "external", "summary": "ORACLE OVMSA-2019-0014 vom 2019-05-03", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2019-May/000936.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1190 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1190" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1170 vom 2019-05-15", "url": "https://access.redhat.com/errata/RHSA-2019:1170" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1487 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1487" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:1483 vom 2019-06-18", "url": "https://access.redhat.com/errata/RHSA-2019:1483" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2029 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:2043 vom 2019-08-06", "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4742 vom 2019-08-10", "url": "http://linux.oracle.com/errata/ELSA-2019-4742.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-2029 vom 2019-08-14", "url": "http://linux.oracle.com/errata/ELSA-2019-2029.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2430-1 vom 2019-09-23", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192430-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2019:2450-1 vom 2019-09-24", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192450-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2020:0036 vom 2020-01-07", "url": "https://access.redhat.com/errata/RHSA-2020:0036" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-1 vom 2019-10-22", "url": "https://usn.ubuntu.com/4163-1/" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4163-2 vom 2019-10-23", "url": "https://usn.ubuntu.com/4163-2/" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4154 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4154" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2019:4159 vom 2019-12-10", "url": "https://access.redhat.com/errata/RHSA-2019:4159" }, { "category": "external", "summary": "Debian Security Advisory DLA 2148 vom 2020-04-01", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202003/msg00025.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1587-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006912.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1603-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006927.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006921.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006932.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1604-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006931.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1602-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006928.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1599-1 vom 2020-06-10", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006924.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006930.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1605-1 vom 2020-06-11", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006929.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1671-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006966.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1656-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006977.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1663-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006971.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1646-1 vom 2020-06-18", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006970.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1754-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007033.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1758-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007031.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:1775-1 vom 2020-06-26", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007036.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2156-1 vom 2020-08-07", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-August/007238.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-2323 vom 2020-08-12", "url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00019.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-4486-1 vom 2020-09-02", "url": "https://usn.ubuntu.com/4486-1/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2478-1 vom 2020-09-03", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007345.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2020:2487-1 vom 2020-09-04", "url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007352.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2861-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009366.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2021:2862-1 vom 2021-08-27", "url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009367.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9473 vom 2021-10-08", "url": "http://linux.oracle.com/errata/ELSA-2021-9473.html" }, { "category": "external", "summary": "ORACLE OVMSA-2021-0035 vom 2021-10-12", "url": "https://oss.oracle.com/pipermail/oraclevm-errata/2021-October/001033.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1988" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10", "url": "https://access.redhat.com/errata/RHSA-2022:1975" }, { "category": "external", "summary": "Debian Security Advisory DLA-3065 vom 2022-07-01", "url": "https://lists.debian.org/debian-lts-announce/2022/07/msg00000.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9969 vom 2022-11-01", "url": "https://linux.oracle.com/errata/ELSA-2022-9969.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-18T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:29:59.999+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0532", "initial_release_date": "2018-05-01T22:00:00.000+00:00", "revision_history": [ { "date": "2018-05-01T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2018-05-01T22:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2018-05-02T22:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2018-05-08T22:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2018-05-10T22:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2018-05-13T22:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2018-05-15T22:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2018-05-16T22:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2018-05-21T22:00:00.000+00:00", "number": "9", "summary": "New remediations available" }, { "date": "2018-05-22T22:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2018-05-23T22:00:00.000+00:00", "number": "13", "summary": "Version nicht vorhanden" }, { "date": "2018-05-29T22:00:00.000+00:00", "number": "14", "summary": "New remediations available" }, { "date": "2018-06-05T22:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2018-06-06T22:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2018-06-07T22:00:00.000+00:00", "number": "17", "summary": "New remediations available" }, { "date": "2018-06-11T22:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2018-06-17T22:00:00.000+00:00", "number": "19", "summary": "New remediations available" }, { "date": "2018-06-18T22:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2018-06-19T22:00:00.000+00:00", "number": "21", "summary": "Added references" }, { "date": "2018-06-21T22:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2018-06-24T22:00:00.000+00:00", "number": "23", "summary": "Added references" }, { "date": "2018-06-27T22:00:00.000+00:00", "number": "24", "summary": "Added references" }, { "date": "2018-07-10T22:00:00.000+00:00", "number": "25", "summary": "New remediations available" }, { "date": "2018-07-29T22:00:00.000+00:00", "number": "26", "summary": "New remediations available" }, { "date": "2018-08-01T22:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-08-06T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-08-09T22:00:00.000+00:00", "number": "29", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2018-08-14T22:00:00.000+00:00", "number": "31", "summary": "New remediations available" }, { "date": "2018-08-15T22:00:00.000+00:00", "number": "32", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "33", "summary": "New remediations available" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "34", "summary": "Version nicht vorhanden" }, { "date": "2018-08-16T22:00:00.000+00:00", "number": "35", "summary": "Version nicht vorhanden" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "36", "summary": "Added references" }, { "date": "2018-09-06T22:00:00.000+00:00", "number": "37", "summary": "New remediations available" }, { "date": "2018-09-10T22:00:00.000+00:00", "number": "38", "summary": "New remediations available" }, { "date": "2018-10-01T22:00:00.000+00:00", "number": "39", "summary": "New remediations available" }, { "date": "2018-10-04T22:00:00.000+00:00", "number": "40", "summary": "New remediations available" }, { "date": "2018-10-09T22:00:00.000+00:00", "number": "41", "summary": "New remediations available" }, { "date": "2018-10-10T22:00:00.000+00:00", "number": "42", "summary": "New remediations available" }, { "date": "2018-10-14T22:00:00.000+00:00", "number": "43", "summary": "New remediations available" }, { "date": "2018-10-30T23:00:00.000+00:00", "number": "44", "summary": "New remediations available" }, { "date": "2018-10-31T23:00:00.000+00:00", "number": "45", "summary": "New remediations available" }, { "date": "2018-11-05T23:00:00.000+00:00", "number": "46", "summary": "New remediations available" }, { "date": "2018-11-07T23:00:00.000+00:00", "number": "47", "summary": "New remediations available" }, { "date": "2018-11-08T23:00:00.000+00:00", "number": "48", "summary": "New remediations available" }, { "date": "2018-11-20T23:00:00.000+00:00", "number": "49", "summary": "New remediations available" }, { "date": "2018-11-28T23:00:00.000+00:00", "number": "50", "summary": "New remediations available" }, { "date": "2018-12-02T23:00:00.000+00:00", "number": "51", "summary": "New remediations available" }, { "date": "2018-12-03T23:00:00.000+00:00", "number": "52", "summary": "Minor corrections" }, { "date": "2018-12-09T23:00:00.000+00:00", "number": "53", "summary": "New remediations available" }, { "date": "2018-12-11T23:00:00.000+00:00", "number": "54", "summary": "New remediations available" }, { "date": "2018-12-12T23:00:00.000+00:00", "number": "55", "summary": "New remediations available" }, { "date": "2019-01-03T23:00:00.000+00:00", "number": "56", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-06T23:00:00.000+00:00", "number": "57", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-01-15T23:00:00.000+00:00", "number": "58", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-02-04T23:00:00.000+00:00", "number": "59", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-17T23:00:00.000+00:00", "number": "60", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-03-25T23:00:00.000+00:00", "number": "61", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-03-31T22:00:00.000+00:00", "number": "62", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-05-05T22:00:00.000+00:00", "number": "63", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2019-05-15T22:00:00.000+00:00", "number": "64", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-06-17T22:00:00.000+00:00", "number": "65", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-06T22:00:00.000+00:00", "number": "66", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-08-11T22:00:00.000+00:00", "number": "67", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-08-13T22:00:00.000+00:00", "number": "68", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2019-09-23T22:00:00.000+00:00", "number": "69", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-09-24T22:00:00.000+00:00", "number": "70", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2019-10-21T22:00:00.000+00:00", "number": "71", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-10-22T22:00:00.000+00:00", "number": "72", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "73", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2019-12-09T23:00:00.000+00:00", "number": "74", "summary": "Version nicht vorhanden" }, { "date": "2020-01-06T23:00:00.000+00:00", "number": "75", "summary": "Neue Updates von AVAYA aufgenommen" }, { "date": "2020-01-07T23:00:00.000+00:00", "number": "76", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2020-04-01T22:00:00.000+00:00", "number": "77", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-06-09T22:00:00.000+00:00", "number": "78", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-11T22:00:00.000+00:00", "number": "79", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-18T22:00:00.000+00:00", "number": "80", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-06-25T22:00:00.000+00:00", "number": "81", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-06T22:00:00.000+00:00", "number": "82", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-08-12T22:00:00.000+00:00", "number": "83", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2020-09-01T22:00:00.000+00:00", "number": "84", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2020-09-03T22:00:00.000+00:00", "number": "85", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2020-09-06T22:00:00.000+00:00", "number": "86", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-08-29T22:00:00.000+00:00", "number": "87", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2021-10-10T22:00:00.000+00:00", "number": "88", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-10-11T22:00:00.000+00:00", "number": "89", "summary": "Neue Updates von ORACLE aufgenommen" }, { "date": "2022-05-10T22:00:00.000+00:00", "number": "90", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-07-03T22:00:00.000+00:00", "number": "91", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2022-11-01T23:00:00.000+00:00", "number": "92", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2023-04-16T22:00:00.000+00:00", "number": "93", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "94", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-04-24T22:00:00.000+00:00", "number": "95", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2023-05-18T22:00:00.000+00:00", "number": "96", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "96" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Avaya Aura Application Enablement Services", "product": { "name": "Avaya Aura Application Enablement Services", "product_id": "T015516", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_application_enablement_services:-" } } }, { "category": "product_name", "name": "Avaya Aura Communication Manager", "product": { "name": "Avaya Aura Communication Manager", "product_id": "T015126", "product_identification_helper": { "cpe": "cpe:/a:avaya:communication_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura Experience Portal", "product": { "name": "Avaya Aura Experience Portal", "product_id": "T015519", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_experience_portal:-" } } }, { "category": "product_name", "name": "Avaya Aura Session Manager", "product": { "name": "Avaya Aura Session Manager", "product_id": "T015127", "product_identification_helper": { "cpe": "cpe:/a:avaya:session_manager:-" } } }, { "category": "product_name", "name": "Avaya Aura System Manager", "product": { "name": "Avaya Aura System Manager", "product_id": "T015518", "product_identification_helper": { "cpe": "cpe:/a:avaya:aura_system_manager:-" } } } ], "category": "vendor", "name": "Avaya" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "6368", "product_identification_helper": { "cpe": "cpe:/o:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux 7", "product": { "name": "Oracle Linux 7", "product_id": "287065", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:7" } } }, { "category": "product_name", "name": "Oracle Linux 6", "product": { "name": "Oracle Linux 6", "product_id": "T002988", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:6" } } }, { "category": "product_name", "name": "Oracle Linux 5", "product": { "name": "Oracle Linux 5", "product_id": "T003616", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:5" } } }, { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "product_name", "name": "Linux" }, { "category": "product_name", "name": "Oracle VM", "product": { "name": "Oracle VM", "product_id": "T011119", "product_identification_helper": { "cpe": "cpe:/a:oracle:vm:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-9016", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2015-9016" }, { "cve": "CVE-2017-0861", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-0861" }, { "cve": "CVE-2017-13166", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-13166" }, { "cve": "CVE-2017-13220", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-13220" }, { "cve": "CVE-2017-16526", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16526" }, { "cve": "CVE-2017-16911", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16911" }, { "cve": "CVE-2017-16912", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16912" }, { "cve": "CVE-2017-16913", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16913" }, { "cve": "CVE-2017-16914", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-16914" }, { "cve": "CVE-2017-17975", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-17975" }, { "cve": "CVE-2017-18017", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18017" }, { "cve": "CVE-2017-18193", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18193" }, { "cve": "CVE-2017-18203", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18203" }, { "cve": "CVE-2017-18216", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18216" }, { "cve": "CVE-2017-18218", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18218" }, { "cve": "CVE-2017-18222", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18222" }, { "cve": "CVE-2017-18224", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18224" }, { "cve": "CVE-2017-18232", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18232" }, { "cve": "CVE-2017-18241", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18241" }, { "cve": "CVE-2017-18257", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-18257" }, { "cve": "CVE-2017-5715", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-5715" }, { "cve": "CVE-2017-5753", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2017-5753" }, { "cve": "CVE-2018-1000004", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1000004" }, { "cve": "CVE-2018-1000199", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1000199" }, { "cve": "CVE-2018-10323", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-10323" }, { "cve": "CVE-2018-1065", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1065" }, { "cve": "CVE-2018-1066", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1066" }, { "cve": "CVE-2018-1068", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1068" }, { "cve": "CVE-2018-1092", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1092" }, { "cve": "CVE-2018-1093", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1093" }, { "cve": "CVE-2018-1108", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-1108" }, { "cve": "CVE-2018-5332", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5332" }, { "cve": "CVE-2018-5333", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5333" }, { "cve": "CVE-2018-5750", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5750" }, { "cve": "CVE-2018-5803", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-5803" }, { "cve": "CVE-2018-6927", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-6927" }, { "cve": "CVE-2018-7480", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7480" }, { "cve": "CVE-2018-7492", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7492" }, { "cve": "CVE-2018-7566", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7566" }, { "cve": "CVE-2018-7740", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7740" }, { "cve": "CVE-2018-7757", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7757" }, { "cve": "CVE-2018-7995", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-7995" }, { "cve": "CVE-2018-8087", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8087" }, { "cve": "CVE-2018-8781", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8781" }, { "cve": "CVE-2018-8822", "notes": [ { "category": "description", "text": "Im Linux Kernel befinden sich zahlreiche Schwachstellen. Diese kann ein entfernter anonymer oder authentisierter Angreifer ausnutzen und z. B. Code mit administrativen Privilegien zur Ausf\u00fchrung bringen, einen Denial of Service Angriff durchf\u00fchren, Sicherheitsmechanismen umgehen, vertrauliche Daten einsehen oder seine Privilegien erweitern." } ], "product_status": { "known_affected": [ "T011119", "T015519", "T015518", "67646", "T015516", "6368", "T015127", "T015126", "T002988", "T003616", "T004914", "2951", "T002207", "T000126", "287065" ] }, "release_date": "2018-05-01T22:00:00.000+00:00", "title": "CVE-2018-8822" } ] }
var-201801-1712
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \"melts\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \"cross-border\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc.
CVE-2017-17975
Tuba Yavuz reported a use-after-free flaw in the USBTV007
audio-video grabber driver.
CVE-2017-18218
Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet
driver.
CVE-2017-18222
It was reported that the Hisilicon Network Subsystem (HNS) driver
implementation does not properly handle ethtool private flags.
CVE-2017-18257
It was reported that the f2fs implementation is prone to an infinite
loop caused by an integer overflow in the __get_data_block()
function.
CVE-2018-1065
The syzkaller tool found a NULL pointer dereference flaw in the
netfilter subsystem when handling certain malformed iptables
rulesets.
CVE-2018-1108
Jann Horn reported that crng_ready() does not properly handle the
crng_init variable states and the RNG could be treated as
cryptographically safe too early after system boot.
CVE-2018-7480
Hou Tao discovered a double-free flaw in the blkcg_init_queue()
function in block/blk-cgroup.c. Relevant releases/architectures:
RHEL 7-based RHEV-H - noarch
- These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
APPLE-SA-2018-1-8-3 Safari 11.0.2
Safari 11.0.2 is now available and and addresses the following:
Available for: OS X El Capitan 10.11.6 and macOS Sierra 10.12.6 Description: Safari 11.0.2 includes security improvements to mitigate the effects of Spectre (CVE- 2017-5753 and CVE-2017-5715).
We would like to acknowledge Jann Horn of Google Project Zero; and Paul Kocher in collaboration with Daniel Genkin of University of Pennsylvania and University of Maryland, Daniel Gruss of Graz University of Technology, Werner Haas of Cyberus Technology, Mike Hamburg of Rambus (Cryptography Research Division), Moritz Lipp of Graz University of Technology, Stefan Mangard of Graz University of Technology, Thomas Prescher of Cyberus Technology, Michael Schwarz of Graz University of Technology, and Yuval Yarom of University of Adelaide and Data61 for their assistance.
Installation note:
Safari 11.0.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
Debian Security Advisory DSA-4187-1 security@debian.org https://www.debian.org/security/ Ben Hutchings May 01, 2018 https://www.debian.org/security/faq
Package : linux CVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753 CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911 CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017 CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241 CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332 CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927 CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757 CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004 CVE-2018-1000199
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
CVE-2015-9016
Ming Lei reported a race condition in the multiqueue block layer
(blk-mq). On a system with a driver using blk-mq (mtip32xx,
null_blk, or virtio_blk), a local user might be able to use this
for denial of service or possibly for privilege escalation.
CVE-2017-0861
Robb Glasser reported a potential use-after-free in the ALSA (sound)
PCM core. We believe this was not possible in practice.
CVE-2017-5715
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 2 (branch
target injection) and is mitigated for the x86 architecture (amd64
and i386) by using the "retpoline" compiler feature which allows
indirect branches to be isolated from speculative execution.
CVE-2017-5753
Multiple researchers have discovered a vulnerability in various
processors supporting speculative execution, enabling an attacker
controlling an unprivileged process to read memory from arbitrary
addresses, including from the kernel and all other processes
running on the system.
This specific attack has been named Spectre variant 1
(bounds-check bypass) and is mitigated by identifying vulnerable
code sections (array bounds checking followed by array access) and
replacing the array access with the speculation-safe
array_index_nospec() function.
More use sites will be added over time.
CVE-2017-13166
A bug in the 32-bit compatibility layer of the v4l2 ioctl handling
code has been found. Memory protections ensuring user-provided
buffers always point to userland memory were disabled, allowing
destination addresses to be in kernel space. On a 64-bit kernel a
local user with access to a suitable video device can exploit this
to overwrite kernel memory, leading to privilege escalation.
CVE-2017-13220
Al Viro reported that the Bluetooth HIDP implementation could
dereference a pointer before performing the necessary type check.
A local user could use this to cause a denial of service.
CVE-2017-16526
Andrey Konovalov reported that the UWB subsystem may dereference
an invalid pointer in an error case. A local user might be able
to use this for denial of service.
CVE-2017-16911
Secunia Research reported that the USB/IP vhci_hcd driver exposed
kernel heap addresses to local users. This information could aid the
exploitation of other vulnerabilities.
CVE-2017-16912
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to an out-of-bounds read. A remote user able to connect to the
USB/IP server could use this for denial of service.
CVE-2017-16913
Secunia Research reported that the USB/IP stub driver failed to
perform a range check on a received packet header field, leading
to excessive memory allocation. A remote user able to connect to
the USB/IP server could use this for denial of service.
CVE-2017-16914
Secunia Research reported that the USB/IP stub driver failed to
check for an invalid combination of fields in a received packet,
leading to a null pointer dereference. A remote user able to
connect to the USB/IP server could use this for denial of service.
CVE-2017-18017
Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module
failed to validate TCP header lengths, potentially leading to a
use-after-free. If this module is loaded, it could be used by a
remote attacker for denial of service or possibly for code
execution.
CVE-2017-18203
Hou Tao reported that there was a race condition in creation and
deletion of device-mapper (DM) devices. A local user could
potentially use this for denial of service.
CVE-2017-18216
Alex Chen reported that the OCFS2 filesystem failed to hold a
necessary lock during nodemanager sysfs file operations,
potentially leading to a null pointer dereference. A local user
could use this for denial of service.
CVE-2017-18232
Jason Yan reported a race condition in the SAS (Serial-Attached
SCSI) subsystem, between probing and destroying a port. This
could lead to a deadlock. A physically present attacker could
use this to cause a denial of service.
CVE-2017-18241
Yunlei He reported that the f2fs implementation does not properly
initialise its state if the "noflush_merge" mount option is used.
A local user with access to a filesystem mounted with this option
could use this to cause a denial of service.
CVE-2018-1066
Dan Aloni reported to Red Hat that the CIFS client implementation
would dereference a null pointer if the server sent an invalid
response during NTLMSSP setup negotiation. This could be used
by a malicious server for denial of service.
CVE-2018-1068
The syzkaller tool found that the 32-bit compatibility layer of
ebtables did not sufficiently validate offset values. On a 64-bit
kernel, a local user with the CAP_NET_ADMIN capability (in any user
namespace) could use this to overwrite kernel memory, possibly
leading to privilege escalation. Debian disables unprivileged user
namespaces by default.
CVE-2018-1092
Wen Xu reported that a crafted ext4 filesystem image would
trigger a null dereference when mounted. A local user able
to mount arbitrary filesystems could use this for denial of
service.
CVE-2018-5332
Mohamed Ghannam reported that the RDS protocol did not
sufficiently validate RDMA requests, leading to an out-of-bounds
write. A local attacker on a system with the rds module loaded
could use this for denial of service or possibly for privilege
escalation.
CVE-2018-5333
Mohamed Ghannam reported that the RDS protocol did not properly
handle an error case, leading to a null pointer dereference. A
local attacker on a system with the rds module loaded could
possibly use this for denial of service.
CVE-2018-5750
Wang Qize reported that the ACPI sbshc driver logged a kernel heap
address. This information could aid the exploitation of other
vulnerabilities.
CVE-2018-5803
Alexey Kodanev reported that the SCTP protocol did not range-check
the length of chunks to be created. A local or remote user could
use this to cause a denial of service.
CVE-2018-6927
Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did
not check for negative parameter values, which might lead to a
denial of service or other security impact.
CVE-2018-7492
The syzkaller tool found that the RDS protocol was lacking a null
pointer check. A local attacker on a system with the rds module
loaded could use this for denial of service.
CVE-2018-7566
Fan LongFei reported a race condition in the ALSA (sound)
sequencer core, between write and ioctl operations. This could
lead to an out-of-bounds access or use-after-free. A local user
with access to a sequencer device could use this for denial of
service or possibly for privilege escalation.
CVE-2018-7740
Nic Losby reported that the hugetlbfs filesystem's mmap operation
did not properly range-check the file offset. A local user with
access to files on a hugetlbfs filesystem could use this to cause
a denial of service.
CVE-2018-7757
Jason Yan reported a memory leak in the SAS (Serial-Attached
SCSI) subsystem. A local user on a system with SAS devices
could use this to cause a denial of service.
CVE-2018-7995
Seunghun Han reported a race condition in the x86 MCE
(Machine Check Exception) driver. This is unlikely to have
any security impact.
CVE-2018-8781
Eyal Itkin reported that the udl (DisplayLink) driver's mmap
operation did not properly range-check the file offset. A local
user with access to a udl framebuffer device could exploit this to
overwrite kernel memory, leading to privilege escalation.
CVE-2018-8822
Dr Silvio Cesare of InfoSect reported that the ncpfs client
implementation did not validate reply lengths from the server. An
ncpfs server could use this to cause a denial of service or
remote code execution in the client.
CVE-2018-1000004
Luo Quan reported a race condition in the ALSA (sound) sequencer
core, between multiple ioctl operations. This could lead to a
deadlock or use-after-free. A local user with access to a
sequencer device could use this for denial of service or possibly
for privilege escalation.
CVE-2018-1000199
Andy Lutomirski discovered that the ptrace subsystem did not
sufficiently validate hardware breakpoint settings. Local users
can use this to cause a denial of service, or possibly for
privilege escalation, on x86 (amd64 and i386) and possibly other
architectures.
For the oldstable distribution (jessie), these problems have been fixed in version 3.16.56-1.
We recommend that you upgrade your linux packages.
For the detailed security status of linux please refer to its security tracker page at: https://security-tracker.debian.org/tracker/linux
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAlron61fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0Rtqw//Xf/L4bP65wU9M59Ef6xBt+Eph+yxeMsioGhu80ODdMemlmHzASMtfZjY AXxyt9l8lbHn8MmwDA4aLhhwHYXwvKATdpHSy1SILrRfb4s9P9uV1vsHaIeZ649E hDyNon9hP2tPso6BwqiYHZZy9Xxtd+T8vTBeBZwUKOLBkBRvV/gyNSUdJWp6L8WH aF4D1hHl9ZotDkyIvkubbx77aqbJ88I4R0n69x7L9udFbuXa+U7hV6dJdnpzyl/7 OukJfEtnkaUgWu0MdOfFss6iH5OQISn/y/ricRi29oKQiEp3YwnT5J9pFwSQeJJS H8ABVt251UoS0J+of3QWw0muOT/6UAF8SNpPKMJXC7Euq8pTmYVPSIeUYf4eqn65 UHZSCKXaszItq+uzVNYdkj504BJ4cG1lFxZtlrFWwKE8p7QOETN0GKvTRdu/SvDd Hl2nb4HouLpBYS518Th2/MGgzhXXAuO12MH3smenptZbqxKn9Z0XSTJYzFupgJk/ kKF2xkDFBE4toTLVE+6XdUKwYk4vkeDZyOGOwRYThSkKAzrUh5zThgal4HnknD2A 5ye4XLhjgSIT47/nmor6lhxd7WGXGkV33GF0azYlHr/sclfzxcU2Ev3NUBWQ8M3s CxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8= =wNQS -----END PGP SIGNATURE----- . Issue date: 2018-01-03 Updated on: 2018-01-09 CVE number: CVE-2017-5753, CVE-2017-5715
Notes:
Hypervisor mitigation can be classified into the two following categories: - Hypervisor-Specific remediation (documented in this advisory) - Hypervisor-Assisted Guest Remediation (documented in VMSA-2018-0004)
The ESXi patches and new versions of Workstation and Fusion of VMSA-2018-0004 include the Hypervisor-Specific remediation documented in this VMware Security Advisory.
More information on the types of remediation may be found in VMware Knowledge Base article 52245. Relevant Products
VMware vSphere ESXi (ESXi) VMware Workstation Pro / Player (Workstation) VMware Fusion Pro / Fusion (Fusion)
- Problem Description
Bounds Check bypass and Branch Target Injection issues
CPU data cache timing can be abused to efficiently leak information out of mis-speculated CPU execution, leading to (at worst) arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.
Result of exploitation may allow for information disclosure from one Virtual Machine to another Virtual Machine that is running on the same host. The remediation listed in the table below is for the known variants of the Bounds Check Bypass and Branch Target Injection issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and CVE-2017-5715 (Branch Target Injection) to these issues.
Column 5 of the following table lists the action required to remediate the observed vulnerability in each release, if a solution is available.
VMware Product Running Replace with/ Mitigation Product Version on Severity Apply patch Workaround ========== ======= ======= ========= ============= ==========
ESXi 6.5 Any Important ESXi650-201712101-SG None ESXi 6.0 Any Important ESXi600-201711101-SG None ESXi 5.5 Any Important ESXi550-201801401-BG None
Workstation 14.x Any N/A Not affected N/A Workstation 12.x Any Important 12.5.8 None
Fusion 10.x OS X N/A Not affected N/A Fusion 8.x OS X Important 8.5.9 None
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware ESXi 6.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/2151099
VMware ESXi 6.0 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/2151132
VMware ESXi 5.5 Downloads: https://my.vmware.com/group/vmware/patch Documentation: http://kb.vmware.com/kb/52127
VMware Workstation Pro, Player 12.5.8 Downloads and Documentation: https://www.vmware.com/go/downloadworkstation https://www.vmware.com/support/pubs/ws_pubs.html
VMware Fusion Pro / Fusion 12.5.9 Downloads and Documentation: https://www.vmware.com/go/downloadfusion https://www.vmware.com/support/pubs/fusion_pubs.html
- Change log
2018-01-03 VMSA-2018-0002 Initial security advisory
2018-01-09 VMSA-2018-0002.1 Updated security advisor after release of ESXi 5.5 patch (ESXi550-201801401-BG) that has remediation against CVE-2017-5715 and CVE-2017-5753 on 2018-01-09. Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org
E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog https://blogs.vmware.com/security
Twitter https://twitter.com/VMwareSRC
Copyright 2018 VMware Inc. All rights reserved. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64
Security Fix(es):
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited.
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. Please refer to References section for further information about this issue and the performance impact.
In this update initial mitigations for IBM Power (PowerPC) and IBM zSeries (S390) architectures are provided.
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important, S390)
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important, PowerPC)
Red Hat would like to thank Google Project Zero for reporting these issues.
Bug Fix(es):
-
When attempting to reread parent blocks in btree traversal, the xfs code which deletes extended attributes from an inode assumed that the parent blocks were still on the cache. Under memory pressure and memory reclaim, such parent blocks were sometimes removed from the cache. Consequently, attempts to reread previously cached parent blocks caused the file system to read invalid memory. This update fixes xfs to reinitialize the pointer to the parent block buffers after the block has been reread. (BZ#1512811)
-
The write access check for huge pages did not function correctly on IBM z Systems. Consequently, if asynchronous I/O reads were used, buffers sometimes contained zeroes rather than data from a file, even when the io_getevents() system call reported that the associated read had finished successfully. This update fixes the write access check in the gup_huge_pmd() function in memory management, and read data is stored in asynchronous I/O buffers properly. (BZ#1513315)
-
With this update, the rule for iptables reloading has been optimized to complete faster. (BZ#1514040)
-
Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
- Bugs fixed (https://bugzilla.redhat.com/):
1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass 1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection 1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling
- Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):
Source: kernel-3.10.0-514.41.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm kernel-doc-3.10.0-514.41.1.el7.noarch.rpm
x86_64: kernel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-headers-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm perf-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):
x86_64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: kernel-3.10.0-514.41.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm kernel-doc-3.10.0-514.41.1.el7.noarch.rpm
ppc64: kernel-3.10.0-514.41.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm kernel-devel-3.10.0-514.41.1.el7.ppc64.rpm kernel-headers-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.ppc64.rpm perf-3.10.0-514.41.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm python-perf-3.10.0-514.41.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm
ppc64le: kernel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm kernel-devel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-headers-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.41.1.el7.ppc64le.rpm perf-3.10.0-514.41.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm
s390x: kernel-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-debug-devel-3.10.0-514.41.1.el7.s390x.rpm kernel-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.41.1.el7.s390x.rpm kernel-devel-3.10.0-514.41.1.el7.s390x.rpm kernel-headers-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.41.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.41.1.el7.s390x.rpm perf-3.10.0-514.41.1.el7.s390x.rpm perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm python-perf-3.10.0-514.41.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm
x86_64: kernel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-devel-3.10.0-514.41.1.el7.x86_64.rpm kernel-headers-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm perf-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.3):
ppc64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/security/vulnerabilities/speculativeexecution https://access.redhat.com/security/cve/CVE-2017-5753 https://access.redhat.com/security/cve/CVE-2017-5715 https://access.redhat.com/security/cve/CVE-2017-5754
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaacZpXlSAg2UNWIIRAioFAJ9P+LP2qadmzmAR5WEaU5UvaOifqgCdFhO+ FkImA43txPx8uAAK1eD546Y= =evDX -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description:
The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. ========================================================================== Ubuntu Security Notice USN-3542-1 January 23, 2018
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were addressed in the Linux kernel. This flaw is known as Spectre.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04 LTS: linux-image-3.13.0-141-generic 3.13.0-141.190 linux-image-3.13.0-141-lowlatency 3.13.0-141.190 linux-image-generic 3.13.0.141.151 linux-image-lowlatency 3.13.0.141.151
Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. On i386 and amd64 architectures, the IBRS and IBPB features are required to enable the kernel mitigations. Ubuntu is working with Intel and AMD to provide future microcode updates that implement IBRS and IBPB as they are made available. Ubuntu users with a processor from a different vendor should contact the vendor to identify necessary firmware updates. Ubuntu will provide corresponding QEMU updates in the future for users of self-hosted virtual environments in coordination with upstream QEMU. Ubuntu users in cloud environments should contact the cloud provider to confirm that the hypervisor has been updated to expose the new CPU features to virtual machines.
Software Description: - firefox: Mozilla Open Source web browser
Details:
It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions. (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754). 7.2) - noarch, x86_64
In this update mitigations for x86-64 architecture are provided. (CVE-2017-5754, Important)
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
Note: the current version of the following document is available here: https://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158629
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: KM03158629 Version: 2
MFSBGN03802 - Virtualization Performance Viewer (vPV) / Cloud Optimizer, Local Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2018-05-11 Last Updated: 2018-05-10
Potential Security Impact: Local: Disclosure of Information
Source: Micro Focus, Product Security Response Team
VULNERABILITY SUMMARY A potential vulnerability has been identified in 3rd party component used by Micro Focus Virtualization Performance Viewer (vPV) / Cloud Optimizer Virtual Appliance.
References:
- CVE-2017-5753
- CVE-2017-5715
- CVE-2017-5754
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
- HP Virtualization Performance Viewer Software - v2.20, v3.0, v3.01, v3.02, v3.03
- HPE Cloud Optimizer - v2.20, v3.0, v3.01, v3.02, v3.03
BACKGROUND
CVSS Base Metrics ================= Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector
RESOLUTION
Micro Focus is actively working with its vendors to address any systems-level Spectre and Meltdown impacts.However, if you have immediate concerns or questions regarding CentOS and its approach to Spectre or Meltdown, please contact them directly.
HISTORY
Version:1 (rev.1) - 12 April 2018 Initial release
Version:2 (rev.2) - 10 May 2018 Vulnerability Summary
Third Party Security Patches: Third party security patches that are to be installed on systems running Micro Focus products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel. For other issues about the content of this Security Bulletin, send e-mail to cyber-psrt@microfocus.com.
Report: To report a potential security vulnerability for any supported product: Web form: https://www.microfocus.com/support-and-services/report-security Email: security@microfocus.com
Subscribe: To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification Once you are logged in to the portal, please choose security bulletins under product and document types. Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability
Software Product Category: The Software Product Category is represented in the title by the two characters following Micro Focus Security Bulletin.
3P = 3rd Party Software GN = Micro Focus General Software MU = Multi-Platform Software
System management and security procedures must be reviewed frequently to maintain system integrity. Micro Focus is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends that all users determine the applicability of this information to their individual situations and take appropriate action. Micro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, Micro Focus will not be responsible for any damages resulting from user's use or disregard of the information provided in this Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2017 EntIT Software LLC
Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Micro Focus and the names of Micro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-1712", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "720qm" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7235" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6585r" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3710" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210m" }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10c" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "cortex-a75", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "740qm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350t" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3235rk" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4720hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4000m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2405s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2435m" }, { "model": "bl ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3380m" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2518" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3317u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700ec" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "460m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "vl bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y32" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5677" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330m" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4160" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x6550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5750hq" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "bl2 bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570r" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2760qm" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134m" }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "650" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3295rk" }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5550u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3690" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6260u" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2340ue" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5618" }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.2" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y30" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4130t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775c" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "760" }, { "model": "el ppc 1000\\/m", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675c" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5557u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3445" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517u" }, { "model": "vl2 ppc7 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "workstation", "scope": "gte", "trust": 1.0, "vendor": "vmware", "version": "12.0.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2629m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3700" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138f" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "6.5" }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5257u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon bronze 3106", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600t" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2675qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2940" }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8350k" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1850" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2358" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460t" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7285" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4460s" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2900" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2550" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3808" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3350" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5200u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4260u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126f" }, { "model": "vl2 ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl2 bpc 9000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5675r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4750hq" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "vl2 ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl2 ppc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qm" }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4722hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5500u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8650u" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3205rk" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2540m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5650" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3720qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820qm" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210" }, { "model": "core m7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y75" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820eq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "cortex-a72", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2102" }, { "model": "fusion", "scope": "lt", "trust": 1.0, "vendor": "vmware", "version": "8.5.9" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170t" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "42.3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610me" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1800" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330e" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3010" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "470um" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5649" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "610e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370t" }, { "model": "el ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2300" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "530" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660lm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5690" }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2390t" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2515e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560m" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3530" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "cortex-a9", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4600u" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2467m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850hq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5680" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4800mq" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2830" }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5120" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e3 1220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500t" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "870s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2550k" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3689y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5700hq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3538" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5672" }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hk" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "bl2 bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3350p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3437u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300y" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3355" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6157u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5667" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "bl bpc 7001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140m" }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4550u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200u" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980x" }, { "model": "simatic itc1900", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2538" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3308" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y51" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640um" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4250u" }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770r" }, { "model": "linux enterprise desktop", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "vl2 ppc9 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2357m" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7820hq" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "bl ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6006u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4158u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217ue" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2750" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3758" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3360m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7530" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2348m" }, { "model": "vs960hd", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "cortex-a73", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "bl2 ppc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j2850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2120t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3229y" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2308" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702ec" }, { "model": "bl bpc 2001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620ue" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "430m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6200u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4510u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5640" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126" }, { "model": "diskstation manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2.2-24922" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200m" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y71" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5122" }, { "model": "fusion", "scope": "gte", "trust": 1.0, "vendor": "vmware", "version": "8.0.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2370m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3427u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5575r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4558u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710mq" }, { "model": "bl rackmount 4u", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2630qm" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4422e" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl2 ppc12 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4310m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2312m" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "cortex-a8", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7555" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3635qm" }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6167u" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330te" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6134" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "6.0" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7567u" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "965" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3115c" }, { "model": "vl2 bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "dl ppc18.5m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5670" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2738" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940xm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660ue" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "975" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5675" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450m" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qm" }, { "model": "valueline ipc", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4760hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "990x" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4200h" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8700" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8600k" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6146" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4960hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7600u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3450s" }, { "model": "vl bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5549" }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "cortex-x1", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l7545" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850eq" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2350" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2758" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120me" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7560u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "cortex-a77", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5509" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750s" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "cortex-r7", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3540m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7y75" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6102e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4302y" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3337u" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3508" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5118" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2910" }, { "model": "bl ppc15 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3405" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2657m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5250u" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "cortex-a76", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590t" }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "12" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500k" }, { "model": "hci", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "bl rackmount 2u", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "880" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4170" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3820qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2520m" }, { "model": "virtual machine manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "6.2-23739" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650u" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl2 bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5640" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2367m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3740qm" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2808" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5647" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4980hq" }, { "model": "vl ppc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3710" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402ec" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2715qe" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4020y" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2130" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "bl ppc17 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5850hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2718" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2610ue" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "390m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "cortex-a78ae", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "cortex-a57", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4025u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6360u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7920hq" }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870hq" }, { "model": "xeon e3 1275", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "930" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2655le" }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2807" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "bl ppc17 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y31" }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8550u" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150t" }, { "model": "vl2 bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4150" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300hq" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920xm" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3630qm" }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670k" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2840" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7542" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620m" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2410m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6400t" }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3130" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3339y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2620m" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2516" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "950" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2960xm" }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "840qm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4500u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4400e" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6152" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300t" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2920" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6685r" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700k" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770s" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2815" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230f" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "970" }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3225" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "875k" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5350h" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3840qm" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "vl2 bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4308u" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2920xm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3338" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4712mq" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3230m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2720qm" }, { "model": "simatic itc1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3227u" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "router manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "1.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "bl2 ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "simatic itc2200 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2930" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ec5539" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5157u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "linux enterprise software development kit", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "neoverse n2", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2380p" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5528" }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "vl2 ppc 9000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700mq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "diskstation manager", "scope": "gte", "trust": 1.0, "vendor": "synology", "version": "5.2" }, { "model": "dl ppc15m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5606" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4005u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "560um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "640lm" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y57" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "820qm" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600k" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl bpc 3001", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2310m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2730" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5300u" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3475s" }, { "model": "simatic winac rtx \\ 2010", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4340te" }, { "model": "simatic itc2200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2637m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3750" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3120m" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1750" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "580m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6136" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4690k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4785t" }, { "model": "bl2 ppc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2375m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590s" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860hq" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3200rk" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770te" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3217u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "670" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "960" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6128" }, { "model": "dl ppc21.5m 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440eq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3610qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2700k" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3230rk" }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7540" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3160" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2649m" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142" }, { "model": "router manager", "scope": "lt", "trust": 1.0, "vendor": "synology", "version": "1.1.7-6941-1" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6402p" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2600" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7295" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5660" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.04" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4950hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540um" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "660um" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3558" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520m" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e7520" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4402e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "bl ppc15 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2617m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3667u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "cortex-a17", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2806" }, { "model": "cortex-a15", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5775r" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7550" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2557m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4570te" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620le" }, { "model": "simatic itc1500 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4578u" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "local service management system", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "13.1" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6144" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3050" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2316" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "350m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030u" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5645" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6148" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "bl bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4910mq" }, { "model": "bl ppc12 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4440" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6287u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100u" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "10" }, { "model": "vl bpc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6130t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4202y" }, { "model": "btc14", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6100h" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700eq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2320" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8250u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110e" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4100e" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4370" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610m" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2508" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3520m" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7660u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4410e" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5638" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "750" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3060" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670qm" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "370m" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2810" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j1900" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "540m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4360t" }, { "model": "vs360hd", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "simatic itc1900 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2430m" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3550s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "940" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210f" }, { "model": "simatic winac rtx \\ 2010", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2010" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6132" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5630" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6126t" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "bl ppc17 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5607" }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4012y" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y70" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4771" }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "42.2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "520e" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3520" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "lc5518" }, { "model": "workstation", "scope": "lt", "trust": 1.0, "vendor": "vmware", "version": "12.5.8" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5650u" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "skynas", "scope": "eq", "trust": 1.0, "vendor": "synology", "version": null }, { "model": "neoverse n1", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620um" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5620" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "980" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "480m" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "620lm" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3330s" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4278u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3130m" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7230" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2640m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340" }, { "model": "cortex-a12", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5119t" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "esxi", "scope": "eq", "trust": 1.0, "vendor": "vmware", "version": "5.5.0" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2125" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2805" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "linux enterprise server", "scope": "eq", "trust": 1.0, "vendor": "suse", "version": "11" }, { "model": "core m3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y30" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3517ue" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3320m" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770hq" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3245" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2510e" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3632qm" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4710hq" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6150" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3687u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5015u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6267u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4300u" }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "solidfire", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "860s" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4765t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670t" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3240t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3340s" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w3680" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5287u" }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7290f" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2635qm" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2530" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4670r" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6300" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4770k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5603" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790t" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11.3" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "655k" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2450p" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4102e" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3615qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4810mq" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7250f" }, { "model": "btc12", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8400" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5609" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4030y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4210h" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3708" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6442eq" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3210m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3439y" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2365m" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6098p" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4790k" }, { "model": "cortex-r8", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6138" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4288u" }, { "model": "bl bpc 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3612qe" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4900mq" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5630" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2537m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3250" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3555le" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4350u" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5020u" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4590" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3220t" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "661" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2677m" }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7700hq" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3510" }, { "model": "el ppc 1000\\/wt", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c2338" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4258u" }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6600k" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4330" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n2820" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2100t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010y" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610y" }, { "model": "bl ppc15 3000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2330m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5010u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4010u" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2377m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2115c" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3470t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2710qe" }, { "model": "pentium n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3540" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2400" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "920" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4700hq" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4120u" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2350m" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6140" }, { "model": "xeon phi", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7210" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4220y" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6500te" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770k" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x7560" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110m" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6350hq" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4430s" }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon bronze 3104", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6320" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5005u" }, { "model": "vl2 bpc 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "680um" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "vl2 ppc 2000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "bl bpc 7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "450m" }, { "model": "visunet rm shell", "scope": "eq", "trust": 1.0, "vendor": "pepperl fuchs", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2500t" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4702hq" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5y10a" }, { "model": "xeon", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5687" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "cortex-a78", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": null }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "330e" }, { "model": "core m5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6y54" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3570t" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2328m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6142m" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "380um" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2105" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3150" }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3000" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "dl ppc15 1000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "vl ipc p7000", "scope": "eq", "trust": 1.0, "vendor": "phoenixcontact", "version": null }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3770" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "6440hq" }, { "model": "atom x3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3265rk" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3537u" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "windows sp1", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "7" }, { "model": "internet explorer", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "11" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "8.1" }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "google", "version": "v8" }, { "model": "windows", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "10" }, { "model": "edge", "scope": "eq", "trust": 0.6, "vendor": "microsoft", "version": "0" }, { "model": "xeon cpu e5-1650", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "cortex a57", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "pro a8-9600 r7", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "compute cores 4c+6g", "scope": "eq", "trust": 0.6, "vendor": "amd", "version": "10" }, { "model": "fx -8320 eight-core processor", "scope": null, "trust": 0.6, "vendor": "amd", "version": null }, { "model": "windows server", "scope": null, "trust": 0.6, "vendor": "microsoft", "version": null } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "145635" } ], "trust": 0.4 }, "cve": "CVE-2017-5753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2017-5753", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2018-00304", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-113956", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2017-5753", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5753", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-00304", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113956", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-5753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is a set of firmware that runs in the CPU (Central Processing Unit) for managing and controlling the CPU. The Meltdown vulnerability exists in the CPU processor core, which \\\"melts\\\" the security boundary implemented by hardware, allowing low-privileged user-level applications to \\\"cross-border\\\" access to system-level memory, causing data leakage. The following products and versions are affected: ARM Cortex-R7; Cortex-R8; Cortex-A8; Cortex-A9; Cortex-A12; Xeon CPU E5-1650 v3, v2, v4; Xeon E3-1265l v2, v3, v4 ; Xeon E3-1245 v2, v3, v5, v6 versions; Xeon X7542, etc. \n\nCVE-2017-17975\n\n Tuba Yavuz reported a use-after-free flaw in the USBTV007\n audio-video grabber driver. \n\nCVE-2017-18218\n\n Jun He reported a user-after-free flaw in the Hisilicon HNS ethernet\n driver. \n\nCVE-2017-18222\n\n It was reported that the Hisilicon Network Subsystem (HNS) driver\n implementation does not properly handle ethtool private flags. \n\nCVE-2017-18257\n\n It was reported that the f2fs implementation is prone to an infinite\n loop caused by an integer overflow in the __get_data_block()\n function. \n\nCVE-2018-1065\n\n The syzkaller tool found a NULL pointer dereference flaw in the\n netfilter subsystem when handling certain malformed iptables\n rulesets. \n\nCVE-2018-1108\n\n Jann Horn reported that crng_ready() does not properly handle the\n crng_init variable states and the RNG could be treated as\n cryptographically safe too early after system boot. \n\nCVE-2018-7480\n\n Hou Tao discovered a double-free flaw in the blkcg_init_queue()\n function in block/blk-cgroup.c. Relevant releases/architectures:\n\nRHEL 7-based RHEV-H - noarch\n\n3. These\npackages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\nAPPLE-SA-2018-1-8-3 Safari 11.0.2\n\nSafari 11.0.2 is now available and and addresses the following:\n\nAvailable for: OS X El Capitan 10.11.6 and macOS Sierra 10.12.6\nDescription: Safari 11.0.2 includes security improvements to mitigate\nthe effects of Spectre (CVE- 2017-5753 and CVE-2017-5715). \n\nWe would like to acknowledge Jann Horn of Google Project Zero; and\nPaul Kocher in collaboration with Daniel Genkin of University of\nPennsylvania and University of Maryland, Daniel Gruss of Graz\nUniversity of Technology, Werner Haas of Cyberus Technology,\nMike Hamburg of Rambus (Cryptography Research Division),\nMoritz Lipp of Graz University of Technology, Stefan Mangard of\nGraz University of Technology, Thomas Prescher of Cyberus Technology,\nMichael Schwarz of Graz University of Technology, and Yuval Yarom of\nUniversity of Adelaide and Data61 for their assistance. \n\nInstallation note:\n\nSafari 11.0.2 may be obtained from the Mac App Store. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4187-1 security@debian.org\nhttps://www.debian.org/security/ Ben Hutchings\nMay 01, 2018 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2015-9016 CVE-2017-0861 CVE-2017-5715 CVE-2017-5753\n CVE-2017-13166 CVE-2017-13220 CVE-2017-16526 CVE-2017-16911\n CVE-2017-16912 CVE-2017-16913 CVE-2017-16914 CVE-2017-18017\n CVE-2017-18203 CVE-2017-18216 CVE-2017-18232 CVE-2017-18241\n CVE-2018-1066 CVE-2018-1068 CVE-2018-1092 CVE-2018-5332\n CVE-2018-5333 CVE-2018-5750 CVE-2018-5803 CVE-2018-6927\n CVE-2018-7492 CVE-2018-7566 CVE-2018-7740 CVE-2018-7757\n CVE-2018-7995 CVE-2018-8781 CVE-2018-8822 CVE-2018-1000004\n CVE-2018-1000199\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks. \n\nCVE-2015-9016\n\n Ming Lei reported a race condition in the multiqueue block layer\n (blk-mq). On a system with a driver using blk-mq (mtip32xx,\n null_blk, or virtio_blk), a local user might be able to use this\n for denial of service or possibly for privilege escalation. \n\nCVE-2017-0861\n\n Robb Glasser reported a potential use-after-free in the ALSA (sound)\n PCM core. We believe this was not possible in practice. \n\nCVE-2017-5715\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 2 (branch\n target injection) and is mitigated for the x86 architecture (amd64\n and i386) by using the \"retpoline\" compiler feature which allows\n indirect branches to be isolated from speculative execution. \n\nCVE-2017-5753\n\n Multiple researchers have discovered a vulnerability in various\n processors supporting speculative execution, enabling an attacker\n controlling an unprivileged process to read memory from arbitrary\n addresses, including from the kernel and all other processes\n running on the system. \n\n This specific attack has been named Spectre variant 1\n (bounds-check bypass) and is mitigated by identifying vulnerable\n code sections (array bounds checking followed by array access) and\n replacing the array access with the speculation-safe\n array_index_nospec() function. \n\n More use sites will be added over time. \n\nCVE-2017-13166\n\n A bug in the 32-bit compatibility layer of the v4l2 ioctl handling\n code has been found. Memory protections ensuring user-provided\n buffers always point to userland memory were disabled, allowing\n destination addresses to be in kernel space. On a 64-bit kernel a\n local user with access to a suitable video device can exploit this\n to overwrite kernel memory, leading to privilege escalation. \n\nCVE-2017-13220\n\n Al Viro reported that the Bluetooth HIDP implementation could\n dereference a pointer before performing the necessary type check. \n A local user could use this to cause a denial of service. \n\nCVE-2017-16526\n\n Andrey Konovalov reported that the UWB subsystem may dereference\n an invalid pointer in an error case. A local user might be able\n to use this for denial of service. \n\nCVE-2017-16911\n\n Secunia Research reported that the USB/IP vhci_hcd driver exposed\n kernel heap addresses to local users. This information could aid the\n exploitation of other vulnerabilities. \n\nCVE-2017-16912\n\n Secunia Research reported that the USB/IP stub driver failed to\n perform a range check on a received packet header field, leading\n to an out-of-bounds read. A remote user able to connect to the\n USB/IP server could use this for denial of service. \n\nCVE-2017-16913\n\n Secunia Research reported that the USB/IP stub driver failed to\n perform a range check on a received packet header field, leading\n to excessive memory allocation. A remote user able to connect to\n the USB/IP server could use this for denial of service. \n\nCVE-2017-16914\n\n Secunia Research reported that the USB/IP stub driver failed to\n check for an invalid combination of fields in a received packet,\n leading to a null pointer dereference. A remote user able to\n connect to the USB/IP server could use this for denial of service. \n\nCVE-2017-18017\n\n Denys Fedoryshchenko reported that the netfilter xt_TCPMSS module\n failed to validate TCP header lengths, potentially leading to a\n use-after-free. If this module is loaded, it could be used by a\n remote attacker for denial of service or possibly for code\n execution. \n\nCVE-2017-18203\n\n Hou Tao reported that there was a race condition in creation and\n deletion of device-mapper (DM) devices. A local user could\n potentially use this for denial of service. \n\nCVE-2017-18216\n\n Alex Chen reported that the OCFS2 filesystem failed to hold a\n necessary lock during nodemanager sysfs file operations,\n potentially leading to a null pointer dereference. A local user\n could use this for denial of service. \n\nCVE-2017-18232\n\n Jason Yan reported a race condition in the SAS (Serial-Attached\n SCSI) subsystem, between probing and destroying a port. This\n could lead to a deadlock. A physically present attacker could\n use this to cause a denial of service. \n\nCVE-2017-18241\n\n Yunlei He reported that the f2fs implementation does not properly\n initialise its state if the \"noflush_merge\" mount option is used. \n A local user with access to a filesystem mounted with this option\n could use this to cause a denial of service. \n\nCVE-2018-1066\n\n Dan Aloni reported to Red Hat that the CIFS client implementation\n would dereference a null pointer if the server sent an invalid\n response during NTLMSSP setup negotiation. This could be used\n by a malicious server for denial of service. \n\nCVE-2018-1068\n\n The syzkaller tool found that the 32-bit compatibility layer of\n ebtables did not sufficiently validate offset values. On a 64-bit\n kernel, a local user with the CAP_NET_ADMIN capability (in any user\n namespace) could use this to overwrite kernel memory, possibly\n leading to privilege escalation. Debian disables unprivileged user\n namespaces by default. \n\nCVE-2018-1092\n\n Wen Xu reported that a crafted ext4 filesystem image would\n trigger a null dereference when mounted. A local user able\n to mount arbitrary filesystems could use this for denial of\n service. \n\nCVE-2018-5332\n\n Mohamed Ghannam reported that the RDS protocol did not\n sufficiently validate RDMA requests, leading to an out-of-bounds\n write. A local attacker on a system with the rds module loaded\n could use this for denial of service or possibly for privilege\n escalation. \n\nCVE-2018-5333\n\n Mohamed Ghannam reported that the RDS protocol did not properly\n handle an error case, leading to a null pointer dereference. A\n local attacker on a system with the rds module loaded could\n possibly use this for denial of service. \n\nCVE-2018-5750\n\n Wang Qize reported that the ACPI sbshc driver logged a kernel heap\n address. This information could aid the exploitation of other\n vulnerabilities. \n\nCVE-2018-5803\n\n Alexey Kodanev reported that the SCTP protocol did not range-check\n the length of chunks to be created. A local or remote user could\n use this to cause a denial of service. \n\nCVE-2018-6927\n\n Li Jinyue reported that the FUTEX_REQUEUE operation on futexes did\n not check for negative parameter values, which might lead to a\n denial of service or other security impact. \n\nCVE-2018-7492\n\n The syzkaller tool found that the RDS protocol was lacking a null\n pointer check. A local attacker on a system with the rds module\n loaded could use this for denial of service. \n\nCVE-2018-7566\n\n Fan LongFei reported a race condition in the ALSA (sound)\n sequencer core, between write and ioctl operations. This could\n lead to an out-of-bounds access or use-after-free. A local user\n with access to a sequencer device could use this for denial of\n service or possibly for privilege escalation. \n\nCVE-2018-7740\n\n Nic Losby reported that the hugetlbfs filesystem\u0027s mmap operation\n did not properly range-check the file offset. A local user with\n access to files on a hugetlbfs filesystem could use this to cause\n a denial of service. \n\nCVE-2018-7757\n\n Jason Yan reported a memory leak in the SAS (Serial-Attached\n SCSI) subsystem. A local user on a system with SAS devices\n could use this to cause a denial of service. \n\nCVE-2018-7995\n\n Seunghun Han reported a race condition in the x86 MCE\n (Machine Check Exception) driver. This is unlikely to have\n any security impact. \n\nCVE-2018-8781\n\n Eyal Itkin reported that the udl (DisplayLink) driver\u0027s mmap\n operation did not properly range-check the file offset. A local\n user with access to a udl framebuffer device could exploit this to\n overwrite kernel memory, leading to privilege escalation. \n\nCVE-2018-8822\n\n Dr Silvio Cesare of InfoSect reported that the ncpfs client\n implementation did not validate reply lengths from the server. An\n ncpfs server could use this to cause a denial of service or\n remote code execution in the client. \n\nCVE-2018-1000004\n\n Luo Quan reported a race condition in the ALSA (sound) sequencer\n core, between multiple ioctl operations. This could lead to a\n deadlock or use-after-free. A local user with access to a\n sequencer device could use this for denial of service or possibly\n for privilege escalation. \n\nCVE-2018-1000199\n\n Andy Lutomirski discovered that the ptrace subsystem did not\n sufficiently validate hardware breakpoint settings. Local users\n can use this to cause a denial of service, or possibly for\n privilege escalation, on x86 (amd64 and i386) and possibly other\n architectures. \n\nFor the oldstable distribution (jessie), these problems have been fixed\nin version 3.16.56-1. \n\nWe recommend that you upgrade your linux packages. \n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\nCxfIO0FNCzO0WIUf40md7MlIAnDBIRGyYgNIIe7AnSRKKPykEx8=\n=wNQS\n-----END PGP SIGNATURE-----\n. \nIssue date: 2018-01-03\nUpdated on: 2018-01-09\nCVE number: CVE-2017-5753, CVE-2017-5715\n\n1. \n\n Notes:\n\n Hypervisor mitigation can be classified into the two following\n categories:\n - Hypervisor-Specific remediation (documented in this advisory)\n - Hypervisor-Assisted Guest Remediation (documented in\n VMSA-2018-0004)\n\n The ESXi patches and new versions of Workstation and Fusion of\n VMSA-2018-0004 include the Hypervisor-Specific remediation documented\n in this VMware Security Advisory. \n\n More information on the types of remediation may be found in VMware\n Knowledge Base article 52245. Relevant Products\n\n VMware vSphere ESXi (ESXi)\n VMware Workstation Pro / Player (Workstation)\n VMware Fusion Pro / Fusion (Fusion)\n\n3. Problem Description\n\n Bounds Check bypass and Branch Target Injection issues\n\n CPU data cache timing can be abused to efficiently leak information\n out of mis-speculated CPU execution, leading to (at worst) arbitrary\n virtual memory read vulnerabilities across local security boundaries\n in various contexts. \n\n Result of exploitation may allow for information disclosure from one\n Virtual Machine to another Virtual Machine that is running on the\n same host. The remediation listed in the table below is for the known\n variants of the Bounds Check Bypass and Branch Target Injection\n issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the identifiers CVE-2017-5753 (Bounds Check bypass) and\n CVE-2017-5715 (Branch Target Injection) to these issues. \n\n Column 5 of the following table lists the action required to\n remediate the observed vulnerability in each release, if a solution\n is available. \n\n VMware Product Running Replace with/ Mitigation\n Product Version on Severity Apply patch Workaround\n ========== ======= ======= ========= ============= ==========\n\n ESXi 6.5 Any Important ESXi650-201712101-SG None\n ESXi 6.0 Any Important ESXi600-201711101-SG None\n ESXi 5.5 Any Important ESXi550-201801401-BG None\n\n Workstation 14.x Any N/A Not affected N/A\n Workstation 12.x Any Important 12.5.8 None\n\n Fusion 10.x OS X N/A Not affected N/A\n Fusion 8.x OS X Important 8.5.9 None\n\n\n4. Solution\n\n Please review the patch/release notes for your product and\n version and verify the checksum of your downloaded file. \n\n VMware ESXi 6.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/2151099\n\n VMware ESXi 6.0\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/2151132\n\n VMware ESXi 5.5\n Downloads:\n https://my.vmware.com/group/vmware/patch\n Documentation:\n http://kb.vmware.com/kb/52127\n\n VMware Workstation Pro, Player 12.5.8\n Downloads and Documentation:\n https://www.vmware.com/go/downloadworkstation\n https://www.vmware.com/support/pubs/ws_pubs.html\n\n VMware Fusion Pro / Fusion 12.5.9\n Downloads and Documentation:\n https://www.vmware.com/go/downloadfusion\n https://www.vmware.com/support/pubs/fusion_pubs.html\n\n\n5. Change log\n\n 2018-01-03 VMSA-2018-0002\n Initial security advisory\n\n 2018-01-09 VMSA-2018-0002.1\n Updated security advisor after release of ESXi 5.5 patch\n (ESXi550-201801401-BG) that has remediation against CVE-2017-5715 and\n CVE-2017-5753 on 2018-01-09. Contact\n\n E-mail list for product security notifications and announcements:\n http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\n This Security Advisory is posted to the following lists:\n\n security-announce@lists.vmware.com\n bugtraq@securityfocus.com\n fulldisclosure@seclists.org\n\n E-mail: security@vmware.com\n PGP key at: https://kb.vmware.com/kb/1055\n\n VMware Security Advisories\n http://www.vmware.com/security/advisories\n\n VMware Security Response Policy\n https://www.vmware.com/support/policies/security_response.html\n\n VMware Lifecycle Support Phases\n https://www.vmware.com/support/policies/lifecycle.html\n\n VMware Security \u0026 Compliance Blog\n https://blogs.vmware.com/security\n\n Twitter\n https://twitter.com/VMwareSRC\n\n Copyright 2018 VMware Inc. All rights reserved. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.3\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64\n\n3. \n\nSecurity Fix(es):\n\nAn industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of instructions (a commonly\nused performance optimization). There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software mitigation\nfor this hardware issue at a cost of potential performance penalty. Please\nrefer to References section for further information about this issue and\nthe performance impact. \n\nIn this update initial mitigations for IBM Power (PowerPC) and IBM zSeries\n(S390) architectures are provided. \n\nVariant CVE-2017-5753 triggers the speculative execution by performing a\nbounds-check bypass. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nboundary and read privileged memory by conducting targeted cache\nside-channel attacks. It relies on the presence of a precisely-defined\ninstruction sequence in the privileged code as well as the fact that memory\naccesses may cause allocation into the microprocessor\u0027s data cache even for\nspeculatively executed instructions that never actually commit (retire). As\na result, an unprivileged attacker could use this flaw to cross the syscall\nand guest/host boundaries and read privileged memory by conducting targeted\ncache side-channel attacks. (CVE-2017-5715, Important, S390)\n\nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. In a combination with the fact\nthat memory accesses may populate the cache even when the block is being\ndropped and never committed (executed), an unprivileged local attacker\ncould use this flaw to read privileged (kernel space) memory by conducting\ntargeted cache side-channel attacks. (CVE-2017-5754, Important, PowerPC)\n\nRed Hat would like to thank Google Project Zero for reporting these issues. \n\nBug Fix(es):\n\n* When attempting to reread parent blocks in btree traversal, the xfs code\nwhich deletes extended attributes from an inode assumed that the parent\nblocks were still on the cache. Under memory pressure and memory reclaim,\nsuch parent blocks were sometimes removed from the cache. Consequently,\nattempts to reread previously cached parent blocks caused the file system\nto read invalid memory. This update fixes xfs to reinitialize the pointer\nto the parent block buffers after the block has been reread. (BZ#1512811)\n\n* The write access check for huge pages did not function correctly on IBM z\nSystems. Consequently, if asynchronous I/O reads were used, buffers\nsometimes contained zeroes rather than data from a file, even when the\nio_getevents() system call reported that the associated read had finished\nsuccessfully. This update fixes the write access check in the\ngup_huge_pmd() function in memory management, and read data is stored in\nasynchronous I/O buffers properly. (BZ#1513315)\n\n* With this update, the rule for iptables reloading has been optimized to\ncomplete faster. (BZ#1514040)\n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1519778 - CVE-2017-5753 hw: cpu: speculative execution bounds-check bypass\n1519780 - CVE-2017-5715 hw: cpu: speculative execution branch target injection\n1519781 - CVE-2017-5754 hw: cpu: speculative execution permission faults handling\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.41.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.41.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm\nperf-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.41.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.41.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.41.1.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-devel-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-headers-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.ppc64.rpm\nperf-3.10.0-514.41.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-514.41.1.el7.s390x.rpm\nkernel-devel-3.10.0-514.41.1.el7.s390x.rpm\nkernel-headers-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-514.41.1.el7.s390x.rpm\nperf-3.10.0-514.41.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\npython-perf-3.10.0-514.41.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.41.1.el7.x86_64.rpm\nperf-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.41.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.41.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/updates/classification/#important\nhttps://access.redhat.com/security/vulnerabilities/speculativeexecution\nhttps://access.redhat.com/security/cve/CVE-2017-5753\nhttps://access.redhat.com/security/cve/CVE-2017-5715\nhttps://access.redhat.com/security/cve/CVE-2017-5754\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaacZpXlSAg2UNWIIRAioFAJ9P+LP2qadmzmAR5WEaU5UvaOifqgCdFhO+\nFkImA43txPx8uAAK1eD546Y=\n=evDX\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Description:\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables\nfine-tuning for systems with extremely high determinism requirements. \n==========================================================================\nUbuntu Security Notice USN-3542-1\nJanuary 23, 2018\n\nlinux vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 14.04 LTS\n\nSummary:\n\nSeveral security issues were addressed in the Linux kernel. This flaw is known as Spectre. \n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 14.04 LTS:\n linux-image-3.13.0-141-generic 3.13.0-141.190\n linux-image-3.13.0-141-lowlatency 3.13.0-141.190\n linux-image-generic 3.13.0.141.151\n linux-image-lowlatency 3.13.0.141.151\n\nPlease note that fully mitigating CVE-2017-5715 (Spectre Variant 2)\nrequires corresponding processor microcode/firmware updates or,\nin virtual environments, hypervisor updates. On i386 and amd64\narchitectures, the IBRS and IBPB features are required to enable the\nkernel mitigations. Ubuntu is working with Intel and AMD to provide\nfuture microcode updates that implement IBRS and IBPB as they are made\navailable. Ubuntu users with a processor from a different vendor should\ncontact the vendor to identify necessary firmware updates. Ubuntu\nwill provide corresponding QEMU updates in the future for users of\nself-hosted virtual environments in coordination with upstream QEMU. \nUbuntu users in cloud environments should contact the cloud provider\nto confirm that the hypervisor has been updated to expose the new\nCPU features to virtual machines. \n\nSoftware Description:\n- firefox: Mozilla Open Source web browser\n\nDetails:\n\nIt was discovered that speculative execution performed by modern CPUs\ncould leak information through a timing side-channel attack, and that\nthis could be exploited in web browser JavaScript engines. If a user were\ntricked in to opening a specially crafted website, an attacker could\npotentially exploit this to obtain sensitive information from other\ndomains, bypassing same-origin restrictions. (CVE-2017-5715,\nCVE-2017-5753, CVE-2017-5754). 7.2) - noarch, x86_64\n\n3. \n\nIn this update mitigations for x86-64 architecture are provided. (CVE-2017-5754, Important)\n\nNote: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64\nmicroprocessors are not affected by this issue. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nNote: the current version of the following document is available here:\nhttps://softwaresupport.hpe.com/document/-/facetsearch/document/KM03158629\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: KM03158629\nVersion: 2\n\nMFSBGN03802 - Virtualization Performance Viewer (vPV) / Cloud Optimizer,\nLocal Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2018-05-11\nLast Updated: 2018-05-10\n\nPotential Security Impact: Local: Disclosure of Information\n\nSource: Micro Focus, Product Security Response Team\n\nVULNERABILITY SUMMARY\nA potential vulnerability has been identified in 3rd party component used by\nMicro Focus Virtualization Performance Viewer (vPV) / Cloud Optimizer Virtual\nAppliance. \n\nReferences:\n\n - CVE-2017-5753\n - CVE-2017-5715\n - CVE-2017-5754\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n - HP Virtualization Performance Viewer Software - v2.20, v3.0, v3.01,\nv3.02, v3.03\n - HPE Cloud Optimizer - v2.20, v3.0, v3.01, v3.02, v3.03\n\nBACKGROUND\n\n CVSS Base Metrics\n =================\n Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector\n\n\nRESOLUTION\n\nMicro Focus is actively working with its vendors to address any systems-level\nSpectre and Meltdown impacts.However, if you have immediate concerns or\nquestions regarding CentOS and its approach to Spectre or Meltdown, please\ncontact them directly. \n\nHISTORY\n\nVersion:1 (rev.1) - 12 April 2018 Initial release\n\nVersion:2 (rev.2) - 10 May 2018 Vulnerability Summary\n\n\nThird Party Security Patches: Third party security patches that are to be installed on \nsystems running Micro Focus products should be applied in accordance with the customer\u0027s \npatch management policy. \n\nSupport: For issues about implementing the recommendations of this Security Bulletin, contact normal Micro Focus services support channel. \nFor other issues about the content of this Security Bulletin, send e-mail to cyber-psrt@microfocus.com. \n\nReport: To report a potential security vulnerability for any supported product:\n Web form: https://www.microfocus.com/support-and-services/report-security\n Email: security@microfocus.com\n\nSubscribe:\n To initiate receiving subscriptions for future Micro Focus Security Bulletin alerts via Email, please subscribe here - https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification\n Once you are logged in to the portal, please choose security bulletins under product and document types. \n Please note that you will need to sign in using a Passport account. If you do not have a Passport account yet, you can create one- its free and easy https://cf.passport.softwaregrp.com/hppcf/createuser.do \n\nSecurity Bulletin Archive:\n A list of recently released Security Bulletins is available here: https://softwaresupport.hpe.com/security-vulnerability\n \nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following Micro Focus Security Bulletin. \n\n3P = 3rd Party Software\nGN = Micro Focus General Software\nMU = Multi-Platform Software\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. \nMicro Focus is continually reviewing and enhancing the security features of software products to provide \ncustomers with current secure solutions. \n\n\"Micro Focus is broadly distributing this Security Bulletin in order to bring to the attention of users of the \naffected Micro Focus products the important security information contained in this Bulletin. Micro Focus recommends \nthat all users determine the applicability of this information to their individual situations and take appropriate action. \nMicro Focus does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, \nMicro Focus will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in \nthis Security Bulletin. To the extent permitted by law, Micro Focus disclaims all warranties, either express or \nimplied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\" \n\n\nCopyright 2017 EntIT Software LLC\n\nMicro Focus shall not be liable for technical or editorial errors or omissions contained herein. \nThe information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, \nneither Micro Focus nor its affiliates, subcontractors or suppliers will be liable for incidental, special \nor consequential damages including downtime cost; lost profits; damages relating to the procurement of \nsubstitute products or services; or damages for loss of data, or software restoration. \nThe information in this document is subject to change without notice. Micro Focus and the names of \nMicro Focus products referenced herein are trademarks of Micro Focus in the United States and other countries. \nOther product and company names mentioned herein may be trademarks of their respective owners", "sources": [ { "db": "NVD", "id": "CVE-2017-5753" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "PACKETSTORM", "id": "145774" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-113956", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=43427", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5753", "trust": 3.0 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 2.0 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 2.0 }, { "db": "BID", "id": "102371", "trust": 1.8 }, { "db": "SECTRACK", "id": "1040071", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-505225", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "145645", "trust": 1.2 }, { "db": "LENOVO", "id": "LEN-18282", "trust": 1.2 }, { "db": "EXPLOIT-DB", "id": "43427", "trust": 1.2 }, { "db": "CERT@VDE", "id": "VDE-2018-003", "trust": 1.2 }, { "db": "CERT@VDE", "id": "VDE-2018-002", "trust": 1.2 }, { "db": "USCERT", "id": "TA18-141A", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-00304", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "145774", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145715", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "145837", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150863", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201801-150", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-113956", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-5753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147454", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145719", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145768", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147451", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145801", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146090", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145655", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146016", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "145635", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147582", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "id": "VAR-201801-1712", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" } ], "trust": 1.32920724375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00304" } ] }, "last_update_date": "2024-11-29T22:02:02.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/07/26/netspectre_network_leak/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/05/21/spectre_meltdown_v4_microsoft_google/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/04/19/oracle_whips_out_the_swatter_squishes_254_security_bugs/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/15/meltdown_ics/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/08/meltdown_fix_security_problems/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/06/qualcomm_processor_security_vulnerabilities/" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2018/01/04/microsoft_windows_patch_meltdown/" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180182 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180011 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180009 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180464 - Security Advisory" }, { "title": "Ubuntu Security Notice: nvidia-graphics-drivers-384 vulnerability", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3521-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.5 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180091 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180292 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180022 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180047 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180018 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180007 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180008 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180496 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180016 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180512 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180021 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180017 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180020 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-appliance security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180045 - Security Advisory" }, { "title": "Red Hat: Important: rhev-hypervisor7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180046 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180010 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180044 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3580-1" }, { "title": "Ubuntu Security Notice: linux, linux-raspi2 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3597-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.2 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180090 - Security Advisory" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.1 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180089 - Security Advisory" }, { "title": "Ubuntu Security Notice: webkit2gtk vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3530-1" }, { "title": "Ubuntu Security Notice: linux-kvm vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3549-1" }, { "title": "Red Hat: Important: Red Hat CloudForms 4.0 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180092 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3542-2" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3542-1" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20180151 - Security Advisory" }, { "title": "Red Hat: CVE-2017-5753", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-5753" }, { "title": "Ubuntu Security Notice: firefox vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3516-1" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3541-2" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-euclid vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3540-1" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3541-1" }, { "title": "Ubuntu Security Notice: linux-hwe vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3597-2" }, { "title": "Ubuntu Security Notice: linux-lts-xenial, linux-aws vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3540-2" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=636e29cbaae925d0974090b2b35e61f3" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=02db86ca4e3ec4d5811922170929d798" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-5753" }, { "title": "Debian CVElist Bug Report Logs: wireshark: CVE-2017-17935: Denial of service in the File_read_line function in epan/wslua/wslua_file.c", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5a7f947350ad7e4fe0bbe84582a1c0a2" }, { "title": "Spectre-Vulnerability-CVE-2017-5753-", "trust": 0.1, "url": "https://github.com/sachinthaBS/Spectre-Vulnerability-CVE-2017-5753- " }, { "title": "cve-2017-5753", "trust": 0.1, "url": "https://github.com/xsscx/cve-2017-5753 " }, { "title": "525Final", "trust": 0.1, "url": "https://github.com/nhodges78/525Final " }, { "title": "Windows-Spectre-Meltdown-Mitigations", "trust": 0.1, "url": "https://github.com/m8urnett/Windows-Spectre-Meltdown-Mitigations " }, { "title": "spectre-cpu-pinning", "trust": 0.1, "url": "https://github.com/hayannoon/spectre-cpu-pinning " }, { "title": "spectre", "trust": 0.1, "url": "https://github.com/raul23/spectre " }, { "title": "awesome-stars", "trust": 0.1, "url": "https://github.com/igaozp/awesome-stars " }, { "title": "linux-exploit", "trust": 0.1, "url": "https://github.com/C0dak/linux-exploit " }, { "title": "spectre-attack", "trust": 0.1, "url": "https://github.com/Eugnis/spectre-attack " }, { "title": "mode-switch-stat", "trust": 0.1, "url": "https://github.com/eecheng87/mode-switch-stat " }, { "title": "Meltdown-Spectre", "trust": 0.1, "url": "https://github.com/jungp0/Meltdown-Spectre " }, { "title": "deep_spectre", "trust": 0.1, "url": "https://github.com/asm/deep_spectre " }, { "title": "spectreScope", "trust": 0.1, "url": "https://github.com/ixtal23/spectreScope " }, { "title": "spectre---attack", "trust": 0.1, "url": "https://github.com/lovesec/spectre---attack " }, { "title": "Spectre-PoC", "trust": 0.1, "url": "https://github.com/chaitanyarahalkar/Spectre-POC " }, { "title": "spectre", "trust": 0.1, "url": "https://github.com/6869736572/spectre " }, { "title": "spectre-attack-example", "trust": 0.1, "url": "https://github.com/poilynx/spectre-attack-example " }, { "title": "sidecheck", "trust": 0.1, "url": "https://github.com/radius314/sidecheck " }, { "title": "selfModify", "trust": 0.1, "url": "https://github.com/chuangshizhiqiang/selfModify " }, { "title": "linux-exploit", "trust": 0.1, "url": "https://github.com/jinb-park/linux-exploit " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/compris-com/spectre-meltdown-checker " }, { "title": "sec", "trust": 0.1, "url": "https://github.com/6869736572/sec " }, { "title": "MeltdownSpectre", "trust": 0.1, "url": "https://github.com/Saiprasad16/MeltdownSpectre " }, { "title": "CiscoSpectreTakeover", "trust": 0.1, "url": "https://github.com/GarnetSunset/CiscoSpectreTakeover " }, { "title": "SpeculativeExecutionAssessment", "trust": 0.1, "url": "https://github.com/GregAskew/SpeculativeExecutionAssessment " }, { "title": "meltdownspectre-patches", "trust": 0.1, "url": "https://github.com/hannob/meltdownspectre-patches " }, { "title": "ansible-role-server-update-reboot", "trust": 0.1, "url": "https://github.com/abouchelliga707/ansible-role-server-update-reboot " }, { "title": "yum-update", "trust": 0.1, "url": "https://github.com/bhanukana/yum-update " }, { "title": "Ansible", "trust": 0.1, "url": "https://github.com/xxkiroxx/Ansible " }, { "title": "MeltdownSpectreReport", "trust": 0.1, "url": "https://github.com/vrdse/MeltdownSpectreReport " }, { "title": "ansible-prometheus-node-exporter", "trust": 0.1, "url": "https://github.com/CyVerse-Ansible/ansible-prometheus-node-exporter " }, { "title": "docker-spectre", "trust": 0.1, "url": "https://github.com/feffi/docker-spectre " }, { "title": "check-spectre-meltdown-ansible", "trust": 0.1, "url": "https://github.com/mbruzek/check-spectre-meltdown-ansible " }, { "title": "meltdown-spectre", "trust": 0.1, "url": "https://github.com/v-lavrentikov/meltdown-spectre " }, { "title": "meltdown", "trust": 0.1, "url": "https://github.com/v-lavrentikov/meltdown " }, { "title": "meltdown-spectre-bios-list", "trust": 0.1, "url": "https://github.com/mathse/meltdown-spectre-bios-list " }, { "title": "HWFW", "trust": 0.1, "url": "https://github.com/danswinus/HWFW " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/mjaggi-cavium/spectre-meltdown-checker " }, { "title": "cpu-report", "trust": 0.1, "url": "https://github.com/rosenbergj/cpu-report " }, { "title": "SpecuCheck", "trust": 0.1, "url": "https://github.com/ionescu007/SpecuCheck " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/github-3rr0r/TEApot " }, { "title": "TEApot", "trust": 0.1, "url": "https://github.com/Mashiro1995/TEApot " }, { "title": "specter---meltdown--checker", "trust": 0.1, "url": "https://github.com/vurtne/specter---meltdown--checker " }, { "title": "Awesome-C", "trust": 0.1, "url": "https://github.com/pathakabhi24/Awesome-C " }, { "title": "awesome-c", "trust": 0.1, "url": "https://github.com/uhub/awesome-c " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "Windows-Spectre-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script " }, { "title": "Windows-Specture-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Specture-Meltdown-Mitigation-Script " }, { "title": "Deep-Security-Reports", "trust": 0.1, "url": "https://github.com/OzNetNerd/Deep-Security-Reports " }, { "title": "Hardware-and-Firmware-Security-Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "cSpeculationControlFixes", "trust": 0.1, "url": "https://github.com/poshsecurity/cSpeculationControlFixes " }, { "title": "puppet-meltdown", "trust": 0.1, "url": "https://github.com/timidri/puppet-meltdown " }, { "title": "Linux-Tools", "trust": 0.1, "url": "https://github.com/minutesinch/Linux-Tools " }, { "title": "Firmware-Security", "trust": 0.1, "url": "https://github.com/virusbeeE/Firmware-Security " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "reverse-engineering-toolkit", "trust": 0.1, "url": "https://github.com/geeksniper/reverse-engineering-toolkit " }, { "title": "ansible-everyday", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "C-libraries", "trust": 0.1, "url": "https://github.com/ambynotcoder/C-libraries " }, { "title": "poc--exp", "trust": 0.1, "url": "https://github.com/HacTF/poc--exp " }, { "title": "poc-exp", "trust": 0.1, "url": "https://github.com/msr00t/poc-exp " }, { "title": "Exp101tsArchiv30thers", "trust": 0.1, "url": "https://github.com/nu11secur1ty/Exp101tsArchiv30thers " }, { "title": "awesome-cve-poc_qazbnm456", "trust": 0.1, "url": "https://github.com/xbl3/awesome-cve-poc_qazbnm456 " }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/working-windows-and-linux-spectre-exploits-found-on-virustotal/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/kaspersky-security-bulletin-2018-top-security-stories/89118/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-netspectre-attack-can-steal-cpu-secrets-via-network-connections/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/academics-announce-new-protections-against-spectre-and-rowhammer-attacks/" }, { "title": "The Register", "trust": 0.1, "url": "https://www.theregister.co.uk/2018/06/16/speculative_execution_spectre_meltdown/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-and-microsoft-reveal-new-spectre-attack/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-spectre-attack-recovers-data-from-a-cpus-protected-smm-mode/" }, { "title": "Securelist", "trust": 0.1, "url": "https://securelist.com/it-threat-evolution-q1-2018/85469/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/new-microsoft-bug-bounty-program-looks-to-squash-the-next-spectre-meltdown/130523/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/hardware/here-we-go-again-intel-releases-updated-spectre-patches/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/we-may-soon-see-malware-leveraging-the-meltdown-and-spectre-vulnerabilities/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/apple/apple-backports-meltdown-patch-to-older-macos-versions/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/hardware/hp-reissuing-bios-updates-after-buggy-intel-meltdown-and-spectre-updates/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/red-hat-will-revert-spectre-patches-after-receiving-reports-of-boot-issues/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/apple-releases-spectre-patches-for-safari-macos-and-ios/129365/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/apple/apple-releases-security-updates-for-spectre-cpu-flaw/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/experts-weigh-in-on-spectre-patch-challenges/129337/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/vendors-share-patch-updates-on-spectre-and-meltdown-mitigation-efforts/129307/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-almost-all-cpus-since-1995-vulnerable-to-meltdown-and-spectre-flaws/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/google-shares-spectre-poc-targeting-browser-javascript-engines/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-5753" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113956" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 2.0, "url": "http://www.kb.cert.org/vuls/id/584653" }, { "trust": 1.9, "url": "http://www.securityfocus.com/bid/102371" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.6, "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "trust": 1.3, "url": "https://www.exploit-db.com/exploits/43427/" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.2, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.2, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180104-cpusidechannel" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "trust": 1.2, "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "trust": 1.2, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2018-001.txt" }, { "trust": 1.2, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.2, "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "trust": 1.2, "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "trust": 1.2, "url": "https://aws.amazon.com/de/security/security-bulletins/aws-2018-013/" }, { "trust": 1.2, "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "trust": 1.2, "url": "https://cdrdv2.intel.com/v1/dl/getcontent/685359" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.2, "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "trust": 1.2, "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "trust": 1.2, "url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes" }, { "trust": 1.2, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180002" }, { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "trust": 1.2, "url": "https://support.citrix.com/article/ctx231399" }, { "trust": 1.2, "url": "https://support.f5.com/csp/article/k91229003" }, { "trust": 1.2, "url": "https://support.hpe.com/hpsc/doc/public/display?docid=emr_na-hpesbhf03805en_us" }, { "trust": 1.2, "url": "https://support.lenovo.com/us/en/solutions/len-18282" }, { "trust": 1.2, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "trust": 1.2, "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "trust": 1.2, "url": "https://www.synology.com/support/security/synology_sa_18_01" }, { "trust": 1.2, "url": "https://www.vmware.com/us/security/advisories/vmsa-2018-0002.html" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4187" }, { "trust": 1.2, "url": "https://www.debian.org/security/2018/dsa-4188" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201810-06" }, { "trust": 1.2, "url": "http://packetstormsecurity.com/files/145645/spectre-information-disclosure-proof-of-concept.html" }, { "trust": 1.2, "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "trust": 1.2, "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "trust": 1.2, "url": "https://spectreattack.com/" }, { "trust": 1.2, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:0292" }, { "trust": 1.2, "url": "http://www.securitytracker.com/id/1040071" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3540-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3540-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3541-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3541-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3542-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3542-2/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3549-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3580-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3597-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3597-2/" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 0.8, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5753" }, { "trust": 0.6, "url": "https://www.bleepingcomputer.com/news/security/list-of-meltdown-and-spectre-vulnerability-advisories-patches-and-updates/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5715" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5753" }, { "trust": 0.4, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5754" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2017-5715" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://access.redhat.com/errata/rhsa-2018:0182" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5803" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18241" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1066" }, { "trust": 0.2, "url": "https://security-tracker.debian.org/tracker/linux" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1068" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000199" }, { "trust": 0.2, "url": "https://www.debian.org/security/faq" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1092" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18216" }, { "trust": 0.2, "url": "https://www.debian.org/security/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5754" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03871en_us" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/203.html" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3521-1/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=58431" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10323" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7757" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1093" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7566" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18224" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7740" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8087" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18193" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17975" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8822" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1065" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-8781" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7480" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7995" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18257" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0044" }, { "trust": 0.1, "url": "https://access.redhat.com/solutions/3307851" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.1, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16911" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-6927" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13166" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-9016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5750" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18232" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5332" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-0861" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16914" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16526" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18017" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-7492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16913" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13220" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16912" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000004" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.17.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.14.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/nvidia-graphics-drivers-384/384.111-0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3521-1" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadfusion" }, { "trust": 0.1, "url": "https://www.vmware.com/support/pubs/fusion_pubs.html" }, { "trust": 0.1, "url": "https://twitter.com/vmwaresrc" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5753" }, { "trust": 0.1, "url": "https://blogs.vmware.com/security" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "https://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5715" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/52127" }, { "trust": 0.1, "url": "https://www.vmware.com/support/pubs/ws_pubs.html" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2151132" }, { "trust": 0.1, "url": "https://my.vmware.com/group/vmware/patch" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2151099" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/lifecycle.html" }, { "trust": 0.1, "url": "https://www.vmware.com/go/downloadworkstation" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "https://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0021" }, { "trust": 0.1, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/spectreandmeltdown" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux/3.13.0-141.190" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3542-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.14.04.1" }, { "trust": 0.1, "url": "https://www.ubuntu.com/usn/usn-3516-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.17.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/firefox/57.0.4+build1-0ubuntu0.17.04.1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2018:0010" }, { "trust": 0.1, "url": "https://www.microfocus.com/support-and-services/report-security" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/group/softwaresupport/email-notification/-/subscriptions/registerdocumentnotification" }, { "trust": 0.1, "url": "https://cf.passport.softwaregrp.com/hppcf/createuser.do" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/security-vulnerability" }, { "trust": 0.1, "url": "https://softwaresupport.hpe.com/document/-/facetsearch/document/km03158629" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-00304" }, { "db": "VULHUB", "id": "VHN-113956" }, { "db": "VULMON", "id": "CVE-2017-5753" }, { "db": "PACKETSTORM", "id": "147454" }, { "db": "PACKETSTORM", "id": "145719" }, { "db": "PACKETSTORM", "id": "145768" }, { "db": "PACKETSTORM", "id": "147451" }, { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "145801" }, { "db": "PACKETSTORM", "id": "146090" }, { "db": "PACKETSTORM", "id": "145655" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "145715" }, { "db": "PACKETSTORM", "id": "145635" }, { "db": "PACKETSTORM", "id": "147582" }, { "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-04T00:00:00", "db": "CNVD", "id": "CNVD-2018-00304" }, { "date": "2018-01-04T00:00:00", "db": "VULHUB", "id": "VHN-113956" }, { "date": "2018-01-04T00:00:00", "db": "VULMON", "id": "CVE-2017-5753" }, { "date": "2018-05-03T01:35:46", "db": "PACKETSTORM", "id": "147454" }, { "date": "2018-01-06T18:01:12", "db": "PACKETSTORM", "id": "145719" }, { "date": "2018-01-09T17:21:50", "db": "PACKETSTORM", "id": "145768" }, { "date": "2018-05-03T01:31:56", "db": "PACKETSTORM", "id": "147451" }, { "date": "2018-01-09T17:32:51", "db": "PACKETSTORM", "id": "145774" }, { "date": "2018-01-10T01:01:35", "db": "PACKETSTORM", "id": "145801" }, { "date": "2018-01-25T21:43:32", "db": "PACKETSTORM", "id": "146090" }, { "date": "2018-01-04T17:51:43", "db": "PACKETSTORM", "id": "145655" }, { "date": "2018-01-23T04:32:03", "db": "PACKETSTORM", "id": "146016" }, { "date": "2018-01-06T18:00:39", "db": "PACKETSTORM", "id": "145715" }, { "date": "2018-01-04T00:52:58", "db": "PACKETSTORM", "id": "145635" }, { "date": "2018-05-10T23:27:00", "db": "PACKETSTORM", "id": "147582" }, { "date": "2018-01-04T13:29:00.257000", "db": "NVD", "id": "CVE-2017-5753" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-01-08T00:00:00", "db": "CNVD", "id": "CNVD-2018-00304" }, { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-113956" }, { "date": "2021-11-23T00:00:00", "db": "VULMON", "id": "CVE-2017-5753" }, { "date": "2024-11-21T03:28:19.097000", "db": "NVD", "id": "CVE-2017-5753" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "145774" }, { "db": "PACKETSTORM", "id": "146016" }, { "db": "PACKETSTORM", "id": "147582" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 } }
gsd-2017-5753
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-5753", "description": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "id": "GSD-2017-5753", "references": [ "https://www.suse.com/security/cve/CVE-2017-5753.html", "https://www.debian.org/security/2018/dsa-4188", "https://www.debian.org/security/2018/dsa-4187", "https://access.redhat.com/errata/RHSA-2018:0654", "https://access.redhat.com/errata/RHSA-2018:0512", "https://access.redhat.com/errata/RHSA-2018:0496", "https://access.redhat.com/errata/RHSA-2018:0464", "https://access.redhat.com/errata/RHSA-2018:0292", "https://access.redhat.com/errata/RHSA-2018:0182", "https://access.redhat.com/errata/RHSA-2018:0151", "https://access.redhat.com/errata/RHSA-2018:0022", "https://access.redhat.com/errata/RHSA-2018:0021", "https://access.redhat.com/errata/RHSA-2018:0020", "https://access.redhat.com/errata/RHSA-2018:0018", "https://access.redhat.com/errata/RHSA-2018:0017", "https://access.redhat.com/errata/RHSA-2018:0016", "https://access.redhat.com/errata/RHSA-2018:0010", "https://ubuntu.com/security/CVE-2017-5753", "https://advisories.mageia.org/CVE-2017-5753.html", "https://security.archlinux.org/CVE-2017-5753", "https://alas.aws.amazon.com/cve/html/CVE-2017-5753.html", "https://linux.oracle.com/cve/CVE-2017-5753.html", "https://packetstormsecurity.com/files/cve/CVE-2017-5753" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-5753" ], "details": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "id": "GSD-2017-5753", "modified": "2023-12-13T01:21:14.067271Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-01-03T00:00:00", "ID": "CVE-2017-5753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Most Modern Operating Systems", "version": { "version_data": [ { "version_value": "All" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "DSA-4187", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "DSA-4188", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "VU#584653", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX231399" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "url": "https://spectreattack.com/" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "1040071", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040071" }, { "name": "102371", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102371" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "USN-3540-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "USN-3541-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3542-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3542-1/" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1750:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1800:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j1900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3060:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3160:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3355:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2805:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2806:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2807:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2808:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2810:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2815:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2820:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2830:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2840:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2910:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2920:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2930:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n2940:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3010:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3050:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3060:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3160:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3350:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4000:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:celeron_n:n4100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j:j2900:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j:j3710:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3510:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3520:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3700:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n3710:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:pentium_n:n4200:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5503:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5504:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5506:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5507:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5520:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5603:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5606:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5607:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5620:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5630:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5640:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5645:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e5649:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e6510:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e6540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e7520:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e7530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:e7540:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:ec5509:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:ec5539:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:ec5549:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l3406:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l3426:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5506:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5508:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5518:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5520:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5530:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5609:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5618:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5630:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5638:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l5640:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l7545:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:l7555:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:lc5518:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:lc5528:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:w3670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:w3680:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:w3690:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:w5580:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:w5590:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3430:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3440:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3450:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3460:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3470:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x3480:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5570:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5647:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5650:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5660:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5667:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5672:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5675:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5677:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5680:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5687:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x5690:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x6550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x7542:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x7550:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon:x7560:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5118:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5119t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5120t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:5122:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6126t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6128:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6130t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6132:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6134m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6136:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6138t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6140m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6142m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6144:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6146:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6148f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6150:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6152:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_gold:6154:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7210f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7230f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7235:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7250f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7285:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7290f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_phi:7295:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:local_service_management_system:13.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:local_service_management_system:13.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:local_service_management_system:13.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2.2-24922", "versionStartIncluding": "5.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "1.1.7-6941-1", "versionStartIncluding": "1.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:synology:virtual_machine_manager:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "6.2-23739", "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:synology:vs360hd_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:synology:vs360hd:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:12:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp2:*:*:*:*:raspberry_pi:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:12:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:11:sp4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_software_development_kit:12:sp3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-r7_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-r7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-r8_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-r8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a8_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a9_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a9:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a12_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a15_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a15:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a17_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a17:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:pepperl-fuchs:visunet_rm_shell:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:pepperl-fuchs:btc12_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:pepperl-fuchs:btc12:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:pepperl-fuchs:btc14_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:pepperl-fuchs:btc14:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc12_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc15_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc17_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc17_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_2001_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_2001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_3001_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_3001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc15_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc15_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc17_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc17_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_bpc_7001_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_bpc_7001:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc15_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc15_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_ppc17_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_ppc17_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_rackmount_2u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_rackmount_2u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl_rackmount_4u_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl_rackmount_4u:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_bpc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_ppc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_bpc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_ppc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_bpc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:bl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:bl2_ppc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:dl_ppc15_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:dl_ppc15_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:dl_ppc15m_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:dl_ppc15m_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:dl_ppc18.5m_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:dl_ppc18.5m_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:dl_ppc21.5m_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:dl_ppc21.5m_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:el_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:el_ppc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/wt_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/wt:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:el_ppc_1000\\/m_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:el_ppc_1000\\/m:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:valueline_ipc_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:valueline_ipc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_bpc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_bpc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_ppc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_bpc_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_ppc_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_ppc_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl_ipc_p7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl_ipc_p7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_bpc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_bpc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_bpc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_bpc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc_2000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc_2000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_bpc_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_bpc_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc_3000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc_3000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_bpc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_bpc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc_7000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc_7000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_bpc_9000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_bpc_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc_9000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc_9000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc7_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc7_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc9_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc9_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:vl2_ppc12_1000_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:vl2_ppc12_1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc1500_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc1500:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc1500_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc1500_pro:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc1900_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc1900:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc1900_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc1900_pro:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc2200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc2200:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itc2200_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "3.1", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itc2200_pro:v3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2010", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:siemens:simatic_winac_rtx_\\(f\\)_2010_firmware:2010:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_winac_rtx_\\(f\\)_2010:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5.9", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.5.8", "versionStartIncluding": "12.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201312402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403209:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403210:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201403211:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201404420:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201406401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201407405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201409207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201410406:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201501405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201502401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201504201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201505404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509209:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509210:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509211:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509212:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201509213:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201510401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201512404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201601401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201602401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201608405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201609403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201612402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201703401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709103:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:5.5.0:550-201709403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201504401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201505401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507406:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201507407:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509209:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201509210:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201510401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201511401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201601405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201602401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201603208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201605401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608404:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201608405:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201610410:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201611403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702209:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702210:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702211:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201702212:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201703401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706103:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706401:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706402:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201706403:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.0:600-201710301:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-a78ae_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-a78ae:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:neoverse_n1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:neoverse_n1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:neoverse_n2_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:neoverse_n2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:arm:cortex-x1_firmware:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:arm:cortex-x1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2017-5753" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-203" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/support/security/Synology_SA_18_01", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_01" }, { "name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/" }, { "name": "https://support.lenovo.com/us/en/solutions/LEN-18282", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.lenovo.com/us/en/solutions/LEN-18282" }, { "name": "https://support.f5.com/csp/article/K91229003", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K91229003" }, { "name": "https://spectreattack.com/", "refsource": "MISC", "tags": [ "Technical Description", "Third Party Advisory" ], "url": "https://spectreattack.com/" }, { "name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002" }, { "name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" }, { "name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" }, { "name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/" }, { "name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution" }, { "name": "http://xenbits.xen.org/xsa/advisory-254.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-254.html" }, { "name": "1040071", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040071" }, { "name": "VU#584653", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/584653" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609" }, { "name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" }, { "name": "43427", "refsource": "EXPLOIT-DB", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/43427/" }, { "name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource": "CISCO", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel" }, { "name": "https://support.citrix.com/article/CTX231399", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX231399" }, { "name": "https://security.netapp.com/advisory/ntap-20180104-0001/", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180104-0001/" }, { "name": "102371", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/102371" }, { "name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html", "refsource": "MISC", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613" }, { "name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611" }, { "name": "openSUSE-SU-2018:0023", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html" }, { "name": "openSUSE-SU-2018:0022", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html" }, { "name": "SUSE-SU-2018:0012", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html" }, { "name": "SUSE-SU-2018:0011", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html" }, { "name": "SUSE-SU-2018:0010", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us" }, { "name": "USN-3516-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/usn/usn-3516-1/" }, { "name": "RHSA-2018:0292", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0292" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt" }, { "name": "USN-3597-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-2/" }, { "name": "USN-3597-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3597-1/" }, { "name": "USN-3580-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3580-1/" }, { "name": "USN-3549-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3549-1/" }, { "name": "USN-3542-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-1/" }, { "name": "USN-3541-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-1/" }, { "name": "USN-3540-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-1/" }, { "name": "USN-3542-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3542-2/" }, { "name": "USN-3541-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3541-2/" }, { "name": "USN-3540-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3540-2/" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory", "Patch" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "DSA-4188", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4188" }, { "name": "DSA-4187", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4187" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-003", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-003" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2018-002", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en-us/advisories/vde-2018-002" }, { "name": "VU#180049", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html" }, { "name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03871en_us" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001" }, { "name": "GLSA-201810-06", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201810-06" }, { "name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [ "Third Party Advisory", "Patch" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cdrdv2.intel.com/v1/dl/getContent/685359", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://cdrdv2.intel.com/v1/dl/getContent/685359" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0 } }, "lastModifiedDate": "2021-11-23T22:14Z", "publishedDate": "2018-01-04T13:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.